Insights on Cryptography, Quantum Readiness, and Security Strategy
Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.
Tags:
US Government’s Deep Dive into China and Why the Quantum Threat Matters
China continues to make significant advances in quantum science and with quantum communication networks. Do these developments pose a threat we should be worried about? The US Congress thinks so. On September 30th, the House Intelligence Committee released “The China Deep Dive.”
All Aboard the Quantum Migration Train
Standards bodies, government organizations, and research centers weigh in on preparing for the threat that quantum computers pose to encryption. Take action now? Don’t worry about it yet? Or, get on the quantum migration train now starting with planning and crypto-agility solutions?
How to Start Readying Your IT Ecosystem for Quantum Now
Quantum computers will deliver tremendous benefits, but they will also be able to break the cryptography underlying public key infrastructure (PKI). Quantum computing will be able to solve very specific hard problems that even the fastest supercomputers cannot solve in a reasonable amount of time today.…
RAND Corporation Report: Quantum Threat
This month the RAND corporation released a new report investigating the quantum threat. The authors consider three key timelines in the coming paradigm shift to quantum-safe cryptography. They investigated when a large-scale quantum computer might be built, how long it might take to complete standards…
COVID-19: A message from our Co-founders
During this difficult time, we first hope that you and your loved ones are safe and healthy. As the world continues to experience rapid changes, we would like to share with you how we've adapted to the ongoing pandemic and how we're meeting the challenges at hand to do our part in reducing the spread…
From Research to Action
Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.
Every Environment Is Different
If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.