Quantum Computing and the Risk to Classical Cryptography

Quantum Computing and the Risk to Classical Cryptography

The recent standardization of first three post-quantum cryptography (PQC) encryption and digital signature algorithms by the U.S. National Institute of Standards and Technology (NIST) has officially kicked off the race to PQC ...
With Quantum coming, NIST readies new software supply chain protection

With Quantum coming, NIST readies new software supply chain protection

While quantum computing is years away from practical deployment, it will pose a major threat to software supply chain security, and now is the time for security teams to prepare for that ...

NIST Releases First Post-Quantum Encryption Algorithms

From the Federal Register: After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key encapsulation mechanism selected was ...
q-day, quantum computers, Secureworks AI quantum IBM Killnet Google BlackBerry Zebra2014 start threat hunting

Q-Day Prepping: What Businesses Can Do Now to Address Quantum Security Risks

We're primed to face another Y2K-like event: Q-Day, the point at which quantum computers become capable of breaking traditional encryption, totally upending security as we know it ...
Security Boulevard
cryptography, quantum, computing, AI, DigiCert encryption,QKD quantum

How to Achieve Crypto Resilience for a Post-Quantum World

While it's unlikely that quantum computers are currently in the hands of cybercriminals or hostile nation-states, they will be ...
Security Boulevard

Lattice-Based Cryptosystems and Quantum Cryptanalysis

Quantum computers are probably coming, though we don’t know when—and when they arrive, they will, most likely, be able to break our standard public-key cryptography algorithms. In anticipation of this possibility, cryptographers ...
Why CISOs Need to Prioritize Quantum Readiness Now

Why CISOs Need To Act On Quantum-Readiness Now

In 1994, when mathematician Peter Shor first introduced the quantum algorithm, now famously known as Shor’s algorithm, many found the concept of quantum computers wild and unreal. Fast forward to 2024, the ...
cryptography, quantum, computing, AI, DigiCert encryption,QKD quantum

The Next Year in Cybersecurity: Quantum, Generative AI and LLMs & Passwords

Cybersecurity professionals will finally have the chance to harness AI for good, and more efficiently and effectively than attackers ...
Security Boulevard

Improving Shor’s Algorithm

We don’t have a useful quantum computer yet, but we do have quantum algorithms. Shor’s algorithm has the potential to factor large numbers faster than otherwise possible, which—if the run times are ...
post quantum cryptography, systems integrator, data privacy, encryption, Exchange quantum-safe

Creating a New Market for Post-Quantum Cryptography

Quantum computing has the potential to disrupt the cybersecurity market and will spark the single largest IT systems upgrade in history ...
Security Boulevard

Application Security Check Up