
+ When developing or augmenting a business’ crypto strategy, the following seven steps can help IT teams get ahead of potential disruptions, respond to high-level crypto risk, strengthen cryptographic defense and act before threats become serious:According to Gartner analysts Mark Horvath and David Anthony Mahdi, most public-key algorithms in use today will be susceptible to attack by quantum computing processors within the next five to eight years.
-
- Conduct an audit to understand how many digital certificates the organization has.
- Build an inventory to identify where they live and what they’re used for.
- Document the hash algorithm they use and their overall health.
- Flag certificate expiration dates.
- Assign or note who owns every certificate.
- Map the methods used to protect valuable code-signing certificates.
- Ensure a centralized method is used to securely update every certificate.
+ Many experts believe that quantum computing will pose a legitimate threat somewhere between 2025 and 2035. When it does, today’s cryptographic algorithms such as RSA and ECC will become easily breakable. Source: isBuzzNews. Ted Shorter, Developing A Unified Crypto Strategy to Get Ahead Of Tomorrow’s Security Threats… Content may have been edited for style and clarity. The “+” to the left of paragraphs or other statements indicates quoted material from “Source:” document. Boldface title is original title from “Source:” Italicized statements are directly quoted from “Source:” document. Image sources are indicated as applicable.