quantum computing
Quantum Computing and the Risk to Classical Cryptography
The recent standardization of first three post-quantum cryptography (PQC) encryption and digital signature algorithms by the U.S. National Institute of Standards and Technology (NIST) has officially kicked off the race to PQC ...
With Quantum coming, NIST readies new software supply chain protection
While quantum computing is years away from practical deployment, it will pose a major threat to software supply chain security, and now is the time for security teams to prepare for that ...
NIST Releases First Post-Quantum Encryption Algorithms
From the Federal Register: After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key encapsulation mechanism selected was ...
Q-Day Prepping: What Businesses Can Do Now to Address Quantum Security Risks
We're primed to face another Y2K-like event: Q-Day, the point at which quantum computers become capable of breaking traditional encryption, totally upending security as we know it ...
How to Achieve Crypto Resilience for a Post-Quantum World
While it's unlikely that quantum computers are currently in the hands of cybercriminals or hostile nation-states, they will be ...
Lattice-Based Cryptosystems and Quantum Cryptanalysis
Quantum computers are probably coming, though we don’t know when—and when they arrive, they will, most likely, be able to break our standard public-key cryptography algorithms. In anticipation of this possibility, cryptographers ...
Why CISOs Need To Act On Quantum-Readiness Now
In 1994, when mathematician Peter Shor first introduced the quantum algorithm, now famously known as Shor’s algorithm, many found the concept of quantum computers wild and unreal. Fast forward to 2024, the ...
The Next Year in Cybersecurity: Quantum, Generative AI and LLMs & Passwords
Cybersecurity professionals will finally have the chance to harness AI for good, and more efficiently and effectively than attackers ...
Improving Shor’s Algorithm
We don’t have a useful quantum computer yet, but we do have quantum algorithms. Shor’s algorithm has the potential to factor large numbers faster than otherwise possible, which—if the run times are ...
Creating a New Market for Post-Quantum Cryptography
Quantum computing has the potential to disrupt the cybersecurity market and will spark the single largest IT systems upgrade in history ...