Insights on Cryptography, Quantum Readiness, and Security Strategy
Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.
Tags:
Four Quantum-Safe Migration Recommendations from ICMC22
This year’s International Cryptographic Module Conference, held in Arlington, V.A., USA, brought together global leaders in commercial cryptography. It was great to see some old faces, make new acquaintances, and put faces to the voices we have been chatting with online over the past few years.
The Great Quantum Journey: It's Time to Accelerate
After years of careful analysis, the National Institute of Standards and Technology (NIST) has announced the selection of four quantum-safe algorithms for standardization: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. "This announcement represents a significant milestone toward a quantum-safe…
NIST Announces Quantum-Safe Algorithms: The New Horizon in Quantum Preparedness
The “dawning of aquarius” is an astrological era believed to bring increased spirituality and harmony on earth. While it is too early to say if quantum computing will bring spirituality and harmony on earth, industry experts, luminaries, and academia have been forecasting and speculating for a long time…
Quantum Computing Urgency and Timeline
What is the quantum computing urgency, the latest post-quantum cryptography (PQC) timeline, and why should organizations prioritize this? The shift to quantum computing is going to be a massive one — as far as migration and transition planning and deployment — and companies need to start readying their…
Quantum-Safe Cryptography Standards Are Taking Off
With cryptography essential to every organization’s operation and continuity, progress on post-quantum cryptography standards is good news all around. By the end of March 2022, the National Institute of Standards and Technology (NIST) plans to announce the results of the third round of its Post-Quantum…
From Research to Action
Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.
Every Environment Is Different
If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.