quantum computing

The Human Advantage in the Age of Technological Uncertainties
Steve Durbin | | AI, AI-based technology, deepfakes, human creativity, humans, inclusive learning., quantum computing, technology
Our excessive reliance on technology has disabled us from crossing the barriers to experience, sense, and relate with others the way we used to. ...
Security Boulevard

HP Intros Printers with Protection Against Quantum Cyberattacks
HP this week introduced new HP printers that include protections against cyberthreats posed by future quantum computers, which could arrive earlier than expected thanks to recent developments. With the new printers, HP ...
Security Boulevard

Microsoft Introduces a New Architecture for Quantum Computers
The world is abuzz with Microsoft’s announcement today of the introduction of their Majorana 1 chip. It could represent a series of important breakthroughs in producing powerful quantum computers. The chip ...

Understanding the 3-Layers of Non-Human Identity (NHI) Security in TrustFour’s Posture and Attack Surface Management Framework
Jim Curtin | | Cryptographic Agility, Mtls Authentication, Non-Human Identity (NHI), OAuth Token Vunerability, quantum computing, TLS Configuration and Compliance, Workload Identity, Workload Micro Segmentation
In today’s interconnected digital ecosystems, securing Non-Human Identities (NHIs) has become a critical focus. NHIs—representing machines, applications, containers, and microservices—outnumber human identities exponentially and serve as essential components in modern IT infrastructures ...
TrustFour’s OWASP 2025 NHI Top Ten Coverage
Robert Levine | | Cryptographic Agility, Mtls Authentication, OAuth Token Vunerability, quantum computing, TLS Configuration and Compliance, Workload Identity, Workload Micro Segmentation
T4 redefines ASM by ensuring only authorized workloads can utilize NHIs through robust isolation powered by mTLS and a “ring-fenced” authorization map. With T4, unauthorized workloads are stopped in their tracks, slashing ...
Google’s Willow Chip: Another Push to Start Your Post-Quantum Cryptography (PQC) Preparation Now
Krupa Patil | | crypto-agility, Cryptography Bill of Materials (CBOM), Post-Quantum Cryptography, PQC, PQC transition, Public Key Infrastructure (PKI), quantum computing
As 2024 drew to a close, Google caught global attention with the announcement of its latest quantum computing chip, Willow. Many believe that with Willow, Google has set a new benchmark for ...
Fifth Generation Warfare (5GW) Readiness with TrustFour
Jim Curtin | | Cryptographic Agility, Mtls Authentication, OAuth Token Vunerability, quantum computing, TLS Configuration and Compliance, Workload Identity, Workload Micro Segmentation
Fifth Generation Warfare (5GW) emphasizes non-traditional tactics such as cyber warfare, information manipulation, and asymmetric strategies. In this context, TrustFour’s expertise in securing workload interactions, managing Transport Layer Security (TLS) configurations, protecting ...
Post-Quantum Cryptography: The Implications of Google’s Willow and Other Quantum Computers for Cybersecurity
Paul Horn | | articles, cryptography, PKI, Post-Quantum Cryptography, public-key infrastructure, quantum computing
Quantum computing was long considered to be part of a distant future. However, it is quickly becoming a reality. Google’s recent announcement of its Willow quantum computing chip is a breakthrough generating ...

Quantum Computing: An Impending Threat to the Current PKI Systems
Anirban Bhattacharya | | cryptographic vulnerabilities, PKI systems, public-key infrastructure, quantum computing, quantum threat
By proactively assessing vulnerabilities and planning for the integration of quantum-resistant cryptographic solutions, enterprises can safeguard their digital assets against future threats ...
Security Boulevard

The Race is on to Solve the Quantum Computing Security Challenge
Quantum computing has long been a topic of intense research and debate, particularly regarding its potential impact on current cryptographic systems ...
Security Boulevard