Limits of Quantum Communication Networks; Secret Key Capacity Explored

Limits of Quantum Communication Networks; Secret Key Capacity Explored Establishing the ultimate limits of quantum communication networks At the moment, sensitive data is typically encrypted and then sent across fibre-optic cables and other channels together with the digital “keys” needed to decode the information. However, the data can be vulnerable to hackers. Quantum communication takes […]

Cloud Security Alliance Issues Quantum Computing and Cybersecurity Guidance for Business Leaders

Cloud Security Alliance Issues Quantum Computing and Cybersecurity Guidance for Business Leaders CSA prepares enterprises for quantum computing cybersecurity threats The Cloud Security Alliance’s (CSA) latest paper brings quantum computing and cybersecurity to the forefront of enterprise leadership’s minds as it tackles some of the biggest questions around the subject. As the quantum age draws […]

Law Enforcement, User-Controlled Encryption, and Quantum Computing

Law Enforcement, User-Controlled Encryption, and Quantum Computing New Perspectives on the Future of Encryption Excerpts and salient points ~ +  Encryption and its effects on law enforcement’s access to data seem to occupy a perennial place in the headlines (and on Lawfare as well)…but the fierce discussion has ignored some critical factors.  One of those […]

ID Q & Mt. Pelerin Solving Quantum-Based Secure Storage for Crypto Assets

ID Q & Mt. Pelerin Solving Quantum-Based Secure Storage for Crypto Assets ID Quantique partners with Mt Pelerin to develop the first quantum-based solution for the secure storage of crypto assets: The Quantum Vault ID Quantique (IDQ), the world leader in quantum-safe security solutions announced today that the company is partnering with Mt Pelerin, the […]