IT Pro 20/20: A quantum leap for security

The sixth issue of IT Pro 20/20 looks at the state of cyber security in 2020 and beyond

Welcome to the fifth issue of IT Pro 20/20, our digital magazine that brings all of the previous month's most important tech issues into clear view.

Each month, we will shine a spotlight on the content that we feel every IT professional should be aware of, only in a condensed version that can be read on the go, at a time that suits you.

Cyber security has proven to be one of the most challenging facets of the lockdown – maintaining a robust posture at a time when workers are dispersed and often outside of the company firewall. Suitably, June’s issue of IT Pro 20/20 is all about cyber security. We’ve pulled together stories that examine the current state of the industry, including how current technology is being used and how future trends are likely to reshape our understanding of cyber security.

Our lead feature looks at the rise of quantum computing, still a fledgeling area of the tech industry but one that promises to upend cyber security as we know it. Yet, these remain promises, and it’s unclear whether we will ever see the future that proponents of the technology envisage.

Turning to trends that are a little more pressing today, we also share an industry hacking story that should serve as a lesson in how not to get hacked. I won’t spoil the story here, but I will say it involves a LinkedIn account, a gullible PA, a chief executive’s shoe size, and Tottenham Hotspur Football Club.

In our last exclusive article, we question whether there is, in fact, any weight at all behind the idea that remote working poses a danger to a business’ cyber security, or if these threats have been somewhat exaggerated. It's likely to be a contentious issue for many, so we'll leave it up to you to decide.

The next IT Pro 20/20 will be available on Friday 31 July. Previous issues can be found here.

We hope you enjoy reading this month's issue. If you would like to receive each issue in your inbox as they release, you can subscribe to our mailing list here.

Featured Resources

Shaping the workplaces of the future

Rise to the challenge

Download now

Enabling a hybrid future

A guide to setting up new working practices

Download now

Seven steps to successful digital innovation and transformation

What to invest in and what to avoid when pursuing digital transformation

Watch now

Defend your organisation from evolving ransomware attacks

Learn what it takes to reduce risk and strengthen operational resiliency

Download now

Recommended

ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021
CISOs aren’t leading by example when it comes to cyber security
cyber security

CISOs aren’t leading by example when it comes to cyber security

24 May 2021
New report highlights the need for diversity in cyber security recruitment
cyber security

New report highlights the need for diversity in cyber security recruitment

28 Apr 2021
IT Pro 20/20: What the EU's new AI rules mean for business
IT regulation

IT Pro 20/20: What the EU's new AI rules mean for business

7 Jun 2021

Most Popular

Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
GitHub to prohibit code that’s used in active attacks
cyber security

GitHub to prohibit code that’s used in active attacks

7 Jun 2021
WWDC 2021: Apple unveils iOS 15, macOS Monterey and more
iOS

WWDC 2021: Apple unveils iOS 15, macOS Monterey and more

8 Jun 2021