Skip to content
  • Home
  • News & Headlines
  • Posts
    • Cybersecurity
    • Business
    • Technology
    • Research
    • Software & Algorithms
    • Government
  • Home
  • News & Headlines
  • Posts
    • Cybersecurity
    • Business
    • Technology
    • Research
    • Software & Algorithms
    • Government

Category: Cybersecurity

Wise: WISeKey Is Implementing Post–Quantum Algorithms in Its Root of Trust Services and Semiconductors for IoT Security

WISeKey is developing a new range of Trust Services, that will take advantage of the latest developments in post-quantum encryption (PQE) to be applied in real-world applications…

U.S. CISA Encourages All Critical Infrastructure Owners to Follow the Post-quantum Cryptography Roadmap

U.S. CISA released a new CISA Insight, Preparing Critical Infrastructure for Post-Quantum Cryptography, which provides critical infrastructure and government network owners and operators an overview of the potential impacts from quantum computing to National Critical Functions and the recommended actions they should take now to begin preparing for the transition.

U.S. CISA Urges Critical Infrastructure to Prepare for Post-Quantum Cryptography

“In the hands of adversaries, sophisticated quantum computers could threaten U.S. national security if we do not begin to prepare now for the new post-quantum cryptographic standard,” CISA says.

Schneier on Security: In the Coming Years We’ll Be Facing a Double Uncertainty

As the new cryptanalytic results demonstrate, we’re still learning a lot about how to turn hard mathematical problems into public-key cryptosystems.

‘Like Y2K’: Will Quantum Computing Be the End of Cryptocurrencies?

Everything that currently exists right now will need to be retrofitted. And that is a big, big job. It’s a bit trite to say, but… equate it to the whole Y2K issue…

WISeKey: Substantial Implementation Progress of Post-quantum Algorithms in Secure Semiconductors

The WISeKey’s team of experts is working with several NIST’s candidates for the MS600X Common Criteria products: Crystals-Kyber for key exchange mechanism, and Crystals-Dilithium for signatures.

While Nobody Can Be Certain if Quantum Computing Will Ever Really Pose a Security Risk Itself, Quantum Apocalypse Prep Surely Will

Someday — maybe in five, 10 or 20 years — mega-powerful computing systems that harness the very weird properties of quantum mechanics could achieve the unthinkable, and obliterate the current methods of encryption that the internet depends on for security.

Study: AES-Based Symmetric Cryptography Threatened by Variational Quantum Attacks

Recently, [scientists], proposed a quantum attack scheme for symmetric cryptography, which may lead to a deadly threat to the security of symmetric cryptography such as AES.

Is It Too Little, Too Late for U.S. CISA’s Post-Quantum Cryptography Initiative?

Scott Bledsoe, CEO at Theon, said while passing of the Quantum Computing Cybersecurity Preparedness Act is a symbolic move in the right direction, it may be just a little too late.

NIST Announces Collaborating Vendors in the Migration to Post-Quantum Cryptography Project

Although NIST has announced their first selections of recommended algorithms to use for PQC, there is still a great amount of work to do.

← Previous
Next →

Our Mission

Privacy Policy

Website Terms of Use

Contact Us

X Logo Linkedin

Copyright 2017-2025 | The Qubit Report | All Rights Reserved