Securing Your Information in the Quantum Era

Quantum computing brings many benefits, but can’t be at the expense of data and system security. Internet traffic has seen a staggering, albeit expected increase since the pandemic. Everything from online gaming, shopping, learning, banking, and streaming services, have all experienced an immense boost in consumption, as society has sought to survive and escape reality.

Print

Pro

Cybersecurity Firm Castle Shield Debuts Data-at-Rest, Quantum-Resistant Hypnos

ANNOUNCING A SECURE, ENTERPRISE DATA-AT-REST SOLUTION – HYPNOS Castle Shield Holdings, LLC., announces [May 17, 2021] the availability of its Hypnos secure enterprise data-at-rest solution. Hypnos secures unstructured data meant to be stored for both short and long- term use, including files on servers, hard drives, backup tapes, and other files in folders intended for […]

Quantum Computing Report: The Cryptopocalypse is Coming

Quantum Computing Report: The Cryptopocalypse is Coming.  A reminder of the basics of cryptography, quantum computing, and the threat to, and vulnerability of encryption, is the way to get the week started.  Lost in the shine of quantum computing technology recently, the vulnerability of your data and your client’s data could hang in the balance […]

Encrypted Data is Secure Today. But Will it be Crackable with Quantum Computers?

Encrypted Data is Secure Today.  But Will it be Crackable with Quantum Computers?  Not all encryption will be readily crackable with quantum computers.  “Symmetric encryption can be decrypted using the same key that was used to encrypt it, while asymmetric encryption requires one key (the public key) to encrypt and another key (the private key) […]

Ensuring Your Encryption is Defended

The warnings are becoming more prolific: Quantum is coming and it’s going to crack encryption. Not necessarily all types of encryption will be readily hackable by quantum computers. There are several defenses one could enable, today: Cryptographic agility, doubling your symmetric key size from today’s average key size, implementation of post-quantum computing algorithms which have been proven resistant to hacking by QCs, and allowing your encryption suite to encode with both current and post-quantum computing algorithms.