quantum computing

The Race is on to Solve the Quantum Computing Security Challenge
Quantum computing has long been a topic of intense research and debate, particularly regarding its potential impact on current cryptographic systems ...
Security Boulevard
Shift Left and Shift Up Workload Attack Surface Protection
Robert Levine | | Cryptographic Agility, Mtls Authentication, OAuth Token Vunerability, quantum computing, TLS Configuration and Compliance, Workload Identity, Workload Micro Segmentation
In today’s security landscape, the concept of a hardened perimeter is increasingly insufficient. With the rise of hybrid and multi-cloud environments, lateral movement attacks, where attackers move through internal systems once a ...
IBM Launches Guardium Data Security Center: Well-Timed for High-Risk Sites
With China showcasing significant recent advancements in quantum computing on top of the concern that a quantum computer could break even the most powerful cryptographic protections in a matter of minutes, having ...

Practical Advice for PQC Migration for TLS 1.3
Dr. Angelique Faye Loe | | certificate lifecycle management, crypto-agility, cryptographic solutions, cryptography, NIST, PKI, Post-Quantum Cryptography, PQC, quantum computing, TLS 1.3, TLS certificate, x.509 certificates
Numerous blogs and articles are urging security professionals to start migrating to quantum-resistant algorithms immediately. This urgency was heightened on August 13, 2024, when NIST finalized the FIPS 203 (ML-KEM), FIPS 204 ...
Post-Quantum Cryptography: Sorting Fact from Fiction
Krupa Patil | | crypto-agility, FIPS 203, FIPS 204, FIPS 205, Post-quantum cryptography (PQC), PQC readiness, PQC transition, quantum computing
Quantum computing, often touted as the “next big revolution,” is a widely discussed topic in the tech world today. As breakthroughs in quantum research bring us closer to the reality of commercially ...
Microsoft Is Adding New Cryptography Algorithms
Microsoft is updating SymCrypt, its core cryptographic library, with new quantum-secure algorithms. Microsoft’s details are here. From a news article: The first new algorithm Microsoft added to SymCrypt is called ML-KEM. Previously ...
Understanding Quantum Threats and How to Secure Data with Post-Quantum Cryptography
Sanjay Kumaar V S | | cryptographic systems, cryptography, encryption, PQC, PQC algorithms, Public Key Cryptography, quantum computing, Quantum Mechanics, rsa
Post-Quantum Cryptography (PQC) is a new generation of encryption algorithms for protecting data against powerful quantum computers. Quantum computers use quantum mechanics to solve complex problems much faster than traditional computers. With ...

Quantum Computing and the Risk to Classical Cryptography
Dr. Angelique Faye Loe | | Advanced Encryption Standard, certificate lifecycle management, crypto-agility, cryptography, NIST, PKI, PQC, quantum computing, SHA-1, SHA-2
The recent standardization of first three post-quantum cryptography (PQC) encryption and digital signature algorithms by the U.S. National Institute of Standards and Technology (NIST) has officially kicked off the race to PQC ...

With Quantum coming, NIST readies new software supply chain protection
While quantum computing is years away from practical deployment, it will pose a major threat to software supply chain security, and now is the time for security teams to prepare for that ...
NIST Releases First Post-Quantum Encryption Algorithms
Bruce Schneier | | cryptography, encryption, national security policy, NIST, quantum computing, security standards, Uncategorized
From the Federal Register: After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key encapsulation mechanism selected was ...