TLS Handshake

Harvest Now, Decrypt Later – Fact or Fiction?

A couple of years ago, I published a blog post AES Turns 20, celebrating the... The post Harvest Now, Decrypt Later – Fact or Fiction? appeared first on Entrust Blog ...

Post-Quantum Cryptography: Is There A Looming Crypto-Apocalypse?

The realm of cryptography finds itself on the cusp of a groundbreaking evolution. While classical encryption methodologies have been heralded for their resilience against brute-force attacks, the arrival of post-quantum risks and ...
post quantum cryptography, systems integrator, data privacy, encryption, Exchange quantum-safe

Signal Intros Quantum-Resistant Encryption for App

The developers of the Signal messaging app are strengthening the app’s central encryption capabilities for the upcoming post-quantum era. Signal is upgrading the Signal Protocol – the cryptographic specifications behind the end-to-end ...
Security Boulevard
quantum data scraping

Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity

As cleantech becomes a bigger part of U.S. critical infrastructure, it faces a bigger risk from cyberattackers leveraging quantum attacks ...
Security Boulevard

Approaches to Deploying Post-Quantum Cryptography | Keyfactor

With NIST’s Post-Quantum Cryptography (PQC) competition entering its last phase and the news about IBM building a 1000 qubit quantum computer by 2023, the discussion on how to deploy quantum-resistant algorithms has ...
VPN cloud VPNs Aren’t Dead

Will VPNs Continue Losing the Battle to Keep Data Secure? 

| | post quantum, Pulse Secure, SDP, VPN
Virtual private networks (VPNs) are under attack and hackers may be winning the battle, using exploits that are becoming all-too-common. While many may argue that VPNs are salvageable and can be returned ...
Security Boulevard