Home
About
About
Press
Team
Partners
Wellbeing
Events
2025
Hall of Fame
F24
S24
F23
F21
F20
S20
F19
S19
F18
F17
S17
F16
S16
F15
S15
F14
S14
F13
Programs
Pre-Accelerator
Cyber Accelerator
Growth Stage Accelerator
Products
Tech Scouting
Accelerator-as-a-Platform
Blog
Prediction Market
Contact Us
Contact
Join a Newsletter
Apply
Startups
Mentors

MACH37 Cyber Accelerator

Home
About
About
Press
Team
Partners
Wellbeing
Events
2025
Hall of Fame
F24
S24
F23
F21
F20
S20
F19
S19
F18
F17
S17
F16
S16
F15
S15
F14
S14
F13
Programs
Pre-Accelerator
Cyber Accelerator
Growth Stage Accelerator
Products
Tech Scouting
Accelerator-as-a-Platform
Blog
Prediction Market
Contact Us
Contact
Join a Newsletter
Apply
Startups
Mentors
Carter Hartmann
October 21, 2021

Cryptocurrencies and Quantum Computing

Carter Hartmann
October 21, 2021
Cryptocurrencies and Quantum Computing

To round out our series on the effects of quantum computing on cryptography we’ll take a deeper look at what it could mean for an especially popular application of cryptography nowadays: cryptocurrencies.

Carter Hartmann
October 18, 2021

Bracing for the Cryptocalypse

Carter Hartmann
October 18, 2021
Bracing for the Cryptocalypse

That last blog might have left you wondering what can be done to prevent quantum computing from “breaking the internet” and all secure digital communication. Luckily, lots of preparation is already underway and it looks like the internet will survive.

Carter Hartmann
October 14, 2021

What is the Cryptocalypse? When is it coming?

Carter Hartmann
October 14, 2021
What is the Cryptocalypse? When is it coming?

The Cryptocalypse will be enabled by quantum computers and is predicted to “break the internet” by cracking all encryption algorithms that are used to secure emails, online banking, and all over-the-internet communication. This blog identifies what type of cryptography systems are actually in trouble and explains why.

Carter Hartmann
October 12, 2021

Growing Regulation of Medical Device Cybersecurity

Carter Hartmann
October 12, 2021
Growing Regulation of Medical Device Cybersecurity

Networked medical devices are a double-edged sword: They have the potential to play a transformational role in health care but also may be a vehicle that exposes patients and health care providers to safety and cybersecurity risks such as being hacked, being infected with malware and being vulnerable to unauthorized access.

Carter Hartmann
October 7, 2021

The Race to Secure 5G

Carter Hartmann
October 7, 2021
The Race to Secure 5G

Mobile network providers are rushing to implement 5G, which is proving to be an extremely difficult and expensive process; however, the tougher part of the 5G “race” is to retool how we secure this new network and the ecosystem of devices and applications that connect to it.

Carter Hartmann
October 4, 2021

Automotive Security in 2021

Carter Hartmann
October 4, 2021
Automotive Security in 2021

Modern cars have dozens of computers on board, and they’re not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering, brakes, and the engine itself. Modern vehicles have up to 50 different automotive IoT devices (computers) hackers can attack.

Newer Posts
Older Posts

MACH37 Knowledge Base / FAQ

Back to Top

Powered by VentureScope™

 

Privacy Policy Terms of Use