Cybersecurity & Cryptography
Keeping Quantum Computing Expectations In Perspective
Keeping Quantum Computing Expectations In Perspective. An educated opinion stating “Given the current state of quantum computing and recent rates of progress, it is highly unexpected
< 20 Years to Quantum Supremacy; >= 20 Years to Implement Quantum Resistant Encryption
Less than 20 years to Quantum Supremacy. 20 or More Years to Implement Quantum Resistant Encryption. Adopting quantum-resistant encryption by your enterprise could take 20
Risk Versus Reward in the Legal Department
Risk Versus Reward in the Legal Department. Encourage your legal office, or department, as it were, to get on-board with cybersecurity. Because quantum is coming. And
Internet of Things and Quantum Cryptography
Internet of Things and Quantum Cryptography. The Internet of Things is driving the fourth industrial revolution; how might quantum cryptography benefit the IoT?Now Deprecated: https://www.engineering.com/IOT/ArticleID/18055/What-Is-Quantum-Cryptography-and-How-Exactly-Can-It-Benefit-IoT.aspx
Mitigating Data Exposure to Quantum Computing
Mitigating Data Exposure to Quantum Computing. A simplified risk-timeline has four influencing factors to consider; given you have made a complete cryptographic inventory. The four
U.S. DoD Awards $500K for Quantum Market Research
U.S. DoD Awards $500K for Quantum Market Research. U.S. DoD Awards $500K for market research on current and future quantum capabilities. The project is intended
Basic Quantum Computing Discussion
Basic Quantum Computing Discussion. New to quantum computing? Curious what it is all about? Here’s some questions and some answers… Discussion is found at EMN…
European Space Agency Sees Laser Communication as Next Revolution
European Space Agency Sees Laser Communication as Next Revolution. With the use of satellites projected to double and spending to increase over $2B from 2020
Act Together or Hack Together?
Act Together or Hack Together? There is a difference in viewpoint on the efficacy of quantum computing and hacking, the ethics behind it, and