quantum computing
DigiCert Survey Reveals Post-Quantum Cybersecurity Challenges
Michael Vizard | | Data Security, DigiCert, encryption, post-quantum computing, PQC, quantum computing
A DigiCert survey found most organizations unprepared to address the security implications of post-quantum computing (PQC) ...
Security Boulevard
You Can’t Rush Post-Quantum-Computing Cryptography Standards
Bruce Schneier | | cryptography, encryption, national security policy, NIST, quantum computing, security standards, Uncategorized
I just read an article complaining that NIST is taking too long in finalizing its post-quantum-computing cryptography standards. This process has been going on since 2016, and since that time there has ...
Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity
As cleantech becomes a bigger part of U.S. critical infrastructure, it faces a bigger risk from cyberattackers leveraging quantum attacks ...
Security Boulevard
Protecting Patient Data: Why Quantum Security is a Must in Health Care
When you visit the doctor or have a hospital stay, you and your patient data become elements in a vast, highly complex digital technology ecosystem. This is because you (as the patient) ...
Security Boulevard
Breaking RSA with a Quantum Computer
Bruce Schneier | | academic papers, china, cryptanalysis, cryptography, quantum computing, Uncategorized
A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be ...
What is Quantum Computing, and Why Should Security Professionals Care?
Quantum computing basics Quantum computing embraces the laws of quantum mechanics to solve those problems that are currently too challenging for even the most high-performance modern computers. Across the board, it is ...
Debunking Quantum Cloud Myths
In many ways, the human appetite for computing power is ever-growing. More computing power can be found in the cloud for our ever-growing thirst for power. But that’s still not enough. Enter ...
The Analyst Prompt #15: Network Environment-Focused Conversations Needed in Approaches to Cyber Security
EclecticIQ Threat Research Team | | Corporate, intelligence research, Malware, quantum computing, supply chain, Threats and Vulnerabilities
Exploit Tools and Targets: Enhance Third-Party Risk Management to Mitigate Multi-Targeted Approach Third-party attacks, or supply chain attacks, occur when a trusted software, vendor, or other external company property or personnel is ...
NIST’s Post-Quantum Cryptography Standards
Schneier.com Webmaster | | algorithms, cryptanalysis, cryptography, NIST, quantum computing, quantum cryptography, Uncategorized
Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit) to be neither 0 nor 1, but ...
CISA Post-Quantum Cryptography Initiative: Too Little, Too Late?
The Cybersecurity and Infrastructure Security Agency (CISA) has established a post-quantum cryptography initiative that aims to unify agency efforts regarding the threats posed by quantum computing. The initiative builds on existing Department ...
Security Boulevard