Supply Chain Cybersecurity Using Artificial Intelligence (AI)
Feb 26th, 2025 – Atlanta, GA – Shivaji Sengupta led the panel on Supply Chain Cybersecurity Using Artificial Intelligence (AI)
Read MoreFeb 26th, 2025 – Atlanta, GA – Shivaji Sengupta led the panel on Supply Chain Cybersecurity Using Artificial Intelligence (AI)
Read MoreAFCEA NOVA Small Business Enterprise IT Day 2022 – May 5, 2022: Shivaji had the pleasure of attending the TechNet
Read MoreNovember 15th, 2023. San Antonio, TX. – Shivaji Sengupta hosted a panel at the AFCEA ALAMO ACE Conference with key
Read MoreJune 25th 2024. Baltimore, MD – Shivaji Sengupta is hosting a panel (8.15 AM EST Room: Engagement Theater 1: Swing
Read MoreTechNet Augusta Wednesday, August 21, 2:15 PM – 3:15 PM: Shivaji Sengupta was a panelist on the panel discussion titled
Read MoreQuantum-resistant cryptography refers to the study and development of cryptographic methods that can resist attacks by quantum computers. These computers use the principles of quantum mechanics to perform certain types of calculations much faster than classical computers, which poses a significant threat to current encryption methods.
Most of the widely used encryption algorithms, such as RSA and Elliptic Curve Cryptography, rely on the difficulty of factoring large numbers or computing discrete logarithms. These problems are known to be solvable in polynomial time on a quantum computer, which means that these algorithms could be easily broken by a sufficiently powerful quantum computer.
Quantum-resistant cryptography, on the other hand, relies on mathematical problems that are believed to be hard even for quantum computers.
Read More.Magnus Management Group, LLC, has been awarded a five-year, $300 million Blanket Purchase Agreement (BPA) by the U.S. Department of
Read MoreQuantum computing’s ability to solve complex problems that are beyond the capabilities of the traditional computer renders it exceptional. While
Read More. Digital dominance is all about using data as a tactical advantage in this new world of cyber actions and
Read MoreSupply Chain Cybersecurity includes a complex of everyday operating issues affected by a network of known and unknown connections, services
Read More