Cybersecurity & Cryptography
Surge in Demand as Businesses Seek to Defend Against the Quantum Threat Puts PQShield in the Driver Seat
Post-quantum cryptography company PQShield has delivered new deals to introduce its quantum-ready cryptographic solutions to organizations across sectors. Today, the company announces a major licensing deal with Microchip Technology, as well as a collaboration with Collins Aerospace.
Russ Fein: Quantum Computing is the “Manhattan Project” of This Generation
Imagine the power and wealth you would have with such a machine.
Why Quantum Computing Poses a Data Security Threat to Society & How to Get a Handle on It [PDF]
To ready your organization for this, it’s important to understand the quantum threat, the state of post-quantum cryptography, and how to prepare for quantum-safe cryptographic systems and procedures…
QKD-as-a-Service! IDQ’s Long Distance and Backbone Quantum Key Distribution Solution Launched
QKD-as-a-Service! IDQ’s Long Distance and Backbone Quantum Key Distribution Solution Launched.
Security Teams Should Be Addressing Quantum Computing’s Likely Cyber-Threats, Now
Organizations should be communicating to their cybersecurity vendors about this issue, “asking them what their quantum-safe roadmap looks like”…
Decrypting Crypto: Cryptocurrencies and the Quantum Computer Threat
Thanks to Shor’s algorithm, cryptocurrencies will be exceptionally vulnerable to a future quantum computing attack.
Harvesting Our Encrypted Data: The Quantum Cryptography Conundrum
The United States is developing new algorithms to protect against the adversary’s future—powerful quantum computing that will be able to break into currently encrypted systems and data.
Trial Launched for “World First” Commercial Quantum-Secured Metro Network
Telecommunications giant BT and Japanese conglomerate Toshiba have announced the trial launch of a “world first” commercial quantum-secured metro network…
Demand for Cybersecurity Skills Rises as Quantum Computing Threats Tighten
New technology threatens to make existing cybersecurity skills obsolete and renders many of the forms of protection they rely on null…