24 Apr 2020

OODAcast – A Conversation With Quantum Security Practitioner Jane Melia of QuintessenceLabs

In this OODAcast we dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring your data remains safe even after quantum computers can break current asymmetric encryption methods. Our guest, Dr. Jane Melia of QuintessenceLabs, is a practitioner who has spent years helping create and bring to market advanced enterprise technologies. She also has a reputation for being able to explain the business impact of technologies in terms conducive to making operational decisions. This skill is a highly needed one in the domain of quantum effects. 

Read More
11 Mar 2020

The 2020 OODA Cybersecurity Watch List

Every year during the RSA season OODA provides an updated list of what we see as the tech firms with the greatest potential to disrupt the cybersecurity market and improve an organization’s ability to manage cyber risk. We base the firms we track in this list off of our own continuous market research and then use the activities around RSA to interview company leaders and other industry professionals to select the firms we believe warrant special focus by the community.

The resulting list can serve multiple stakeholders. Investors can find firms that have demonstrated good product-market fit and are good candidates for follow-on funding. CISOs can find companies that have demonstrated real disruptive technology potential and at least enough traction to prove they are worth considering. And larger tech firms can find interesting businesses worth tracking for potential partnering and, perhaps later in the firm’s lifecycle, for potential M&A.

Read More
13 Nov 2019

The Executive’s Guide To Quantum Safe Security: Take these steps to make your enterprise quantum proof

The steady progress in quantum computing is resulting in exciting developments that will one day bring new capabilities to a wide range of use cases. Quantum computers can also bring new capabilities to attackers. The mathematician Peter Shor has proven that quantum computers can be used to rapidly factor large numbers into their primes in a way that will break most forms of asymmetric encryption used today. The computer scientist Lov Grover proved another algorithm that will, among other things, enable incredibly fast invalidation of another tool for security, the security hash. There are certainly other ways quantum computers will be used by adversaries, but these two methods alone are cause for serious concern. Imagine all the data your company believes is important being read by an adversary that wants to put you out of business, and imagine that adversary is operating in a location untouchable by the rule of law. 

Read More