Posts tagged with: Cybersecurity

Building Quantum Resilience Requires C-Suite Commitment, but It Doesn’t Have to Mean Tearing Out Existing Infrastructure

As we see with government agencies and a host of other organizations, the data you generate today can provide adversaries with tremendous value in the future once they can access...

The Retrospective Post-Quantum Problem You Should Consider

Attention to policy regarding a post-quantum cryptography (PQC) world has been focused primarily on policy that would facilitate an infrastructural transition to quantum-resistant encryption algorithms....

It’s Good, and It’s Bad, But Here is the Quantum Revolution…

Some developers are on the cusp of reaching 'quantum advantage', a crucial breakthrough....

U.S. Spy Agency Sets Requirements and Deadline for Adoption of Post-Quantum Cryptography

The Director of NSA is the National Manager for NSS and therefore issues guidance for NSS. The algorithms in CNSA 2.0 are an update to those in the currently required...

Wise: WISeKey Is Implementing Post–Quantum Algorithms in Its Root of Trust Services and Semiconductors for IoT Security

WISeKey is developing a new range of Trust Services, that will take advantage of the latest developments in post-quantum encryption (PQE) to be applied in real-world applications......

Max Planck Institute Physicists Have Managed to Create a Basis for New Type of Quantum Computer

In order to effectively use a quantum computer, a larger number of specially prepared – in technical terms: entangled – basic building blocks are needed to carry out computational operations......