Why CISOs Need to Prioritize Quantum Readiness Now

Why CISOs Need To Act On Quantum-Readiness Now

In 1994, when mathematician Peter Shor first introduced the quantum algorithm, now famously known as Shor’s algorithm, many found the concept of quantum computers wild and unreal. Fast forward to 2024, the ...
Microsoft Deprecates 1024-bit Keys

Microsoft Deprecates 1024-bit RSA Keys. Are You Prepared to Upgrade?

Microsoft recently announced that Windows will no longer support TLS server certificates with RSA encryption keys shorter than 2048 bits. The move is intended to bolster Windows security and promote secure digital ...
post quantum cryptography, systems integrator, data privacy, encryption, Exchange quantum-safe

Creating a New Market for Post-Quantum Cryptography

Quantum computing has the potential to disrupt the cybersecurity market and will spark the single largest IT systems upgrade in history ...
Security Boulevard
6 Steps To Prepare For Post-Quantum Cryptography

6 Steps To Prepare For Post-Quantum Cryptography

Preparing for post-quantum cryptography is essential to ensure the security of digital communications and data ahead of when quantum computers can potentially break current today’s cryptographic algorithms. Here are six steps to ...
APT AiTM quantum attacks Raspberry Robin APT29 ransomware NATO Barracuda Networks ATO Attacks

QKD: The Key to a Resilient Future

One of the most imminent and pressing threats to organizations presently is harvest now, decrypt later (HNDL) attacks. According to a recent poll, half of responding professionals at organizations considering quantum computing ...
Security Boulevard
post quantum cryptography, systems integrator, data privacy, encryption, Exchange quantum-safe

CISA Post-Quantum Cryptography Initiative: Too Little, Too Late?

The Cybersecurity and Infrastructure Security Agency (CISA) has established a post-quantum cryptography initiative that aims to unify agency efforts regarding the threats posed by quantum computing. The initiative builds on existing Department ...
Security Boulevard
quantum computing, AI, DigiCert encryption,QKD quantum

Soon, Quantum Computing Could Break Your Encryption

Quantum computing could break your encryption. It could happen within a couple of years, or it may be a decade or two away. Still, certainly, in the relatively near future, quantum computing ...
Security Boulevard
Quantum computing

Post Quantum Cryptography: Data Security in a Post-Quantum World

Just because quantum computing is a few years away doesn’t mean that you should avoid thinking about how to deal with this emerging threat now with quantum resistant algorithms Every... The post ...
quantum computing

Quantum Computing Is Coming: Are You Cyber Ready?

We’ve been hearing about the vast potential of quantum computing for years. With its exponentially superior processing power, this game-changing technology is expected to dramatically transform fields such as medical sciences, machine ...
Security Boulevard
Post-Quantum Cryptography: 10 Things You Need to Know

Post-Quantum Cryptography: 10 Things You Need to Know

DigiCert’s newly released survey shows that 71% of IT professionals consider quantum computing a looming threat to encryption and security—here’s how you can protect your company and customers Quantum computing... The post ...