The CyberWatch Journal By Hossain Shahriar

Send Email LinkedIn logo
Robert Smith picture

CyberWatchers – Securing the Digital Future !

Welcome to CyberWatchers -- Where Innovation Meets Security Excellence

I am Hossain, a seasoned technology leader with a proven track record in automation, quality engineering, and cybersecurity.

In today’s interconnected world, protecting digital assets is a critical business priority. At CyberWatchers, I bring years of leadership in automation, quality engineering, and cybersecurity to help organizations strengthen systems, streamline operations, and innovate securely.

Blog Posts

Image 1

# Post 1: Ransomware – To Pay or Not to Pay? A Critical Decision in the Boardroom

ransomware, cyber extortion, double extortion, data breach, incident response, business continuity, cybersecurity strategy, regulatory compliance, cyber resilience, ransomware payment ethics

Ransomware has become one of the most significant cybersecurity threats, with attackers using sophisticated double extortion tactics — encrypting files while also threatening a data breach if demands are not met. Executives must weigh whether paying ransom supports business continuity or fuels further cyber extortion. Payment offers no guarantee of full data restoration, introduces regulatory compliance risks, and can harm a company’s cyber resilience. Industry experts advocate robust incident response plans, segmented backups, and ongoing cybersecurity strategy to reduce the likelihood of such crises. Ultimately, organizations that prepare in advance can make ethical, lawful, and sustainable decisions when confronted with a ransomware attack.

Image-2

# Post 2: Quantum Computing – The Next Frontier and Its Cybersecurity Implications

quantum computing, post-quantum cryptography, PQC, Shor’s algorithm, public key encryption, RSA, ECC, quantum key distribution, QKD, cryptographic migration, cybersecurity future, encryption security

Quantum computing promises immense processing power but poses a serious threat to current public key encryption systems like RSA and ECC. Using algorithms such as Shor’s algorithm, quantum computers could render today’s encryption obsolete, forcing the adoption of post-quantum cryptography (PQC). This migration will require large-scale cryptographic audits, protocol updates, and integration with NIST’s PQC standards. On the defense side, technologies like quantum key distribution (QKD) offer unbreakable encryption based on physics. Businesses must engage in cybersecurity future planning now to ensure their systems remain secure in the quantum era.