quantum computing

Post-quantum cryptography and the future of online safety

Post-quantum cryptography and the future of online safety 2025-03-28 at 07:04 By Help Net Security In this Help Net Security video, Rebecca Krauthamer, CEO of QuSecure, explores the rising urgency of post-quantum cryptography (PQC) and what organizations must do to prepare. She breaks down the so-called “quantum threat” and explains why it’s not just theoretical. […]

React to this headline:

Loading spinner

Post-quantum cryptography and the future of online safety Read More »

ETSI releases security standard for the quantum future

ETSI releases security standard for the quantum future 2025-03-27 at 06:35 By Help Net Security ETSI launched post-quantum security standard to guarantee the protection of critical data and communications in the future. The specification “Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies” (ETSI TS 104 015) has been developed to enhance security mechanisms, ensuring

React to this headline:

Loading spinner

ETSI releases security standard for the quantum future Read More »

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm 2025-03-17 at 19:58 By Kevin Townsend First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC.  The post NIST Announces HQC as Fifth Standardized Post Quantum Algorithm appeared first on SecurityWeek.

React to this headline:

Loading spinner

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm Read More »

NIST selects HQC as backup algorithm for post-quantum encryption

NIST selects HQC as backup algorithm for post-quantum encryption 2025-03-12 at 13:32 By Help Net Security Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has selected a backup algorithm that can provide a second line of defense for the

React to this headline:

Loading spinner

NIST selects HQC as backup algorithm for post-quantum encryption Read More »

Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits

Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits 2025-03-03 at 15:33 By Kevin Townsend Amazon claims its researchers have combined cat qubit technology and additional quantum error correction components onto a microchip that can be manufactured in a scalable fashion. The post Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant

React to this headline:

Loading spinner

Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits Read More »

What Microsoft’s Majorana 1 Chip Means for Quantum Decryption

What Microsoft’s Majorana 1 Chip Means for Quantum Decryption 2025-02-24 at 21:20 By Kevin Townsend The question is whether Majorana 1 advances progress toward quantum computing – or for security professionals, the arrival of computers powerful enough to break PKE. The post What Microsoft’s Majorana 1 Chip Means for Quantum Decryption appeared first on SecurityWeek.

React to this headline:

Loading spinner

What Microsoft’s Majorana 1 Chip Means for Quantum Decryption Read More »

Aim for crypto-agility, prepare for the long haul

Aim for crypto-agility, prepare for the long haul 2025-02-04 at 07:33 By Help Net Security While organizations have long experimented with various facets of digital transformation, the journey toward crypto-agility is one of the most significant technological transitions of our time. Success in the emerging quantum era will require technical expertise, strategic foresight, careful planning,

React to this headline:

Loading spinner

Aim for crypto-agility, prepare for the long haul Read More »

Cyber Insights 2025: Quantum and the Threat to Encryption

Cyber Insights 2025: Quantum and the Threat to Encryption 2025-02-03 at 17:03 By Kevin Townsend 2025 is an important year – it is probably our last chance to start our migration to post quantum cryptography before we are all undone by cryptographically relevant quantum computers. The post Cyber Insights 2025: Quantum and the Threat to

React to this headline:

Loading spinner

Cyber Insights 2025: Quantum and the Threat to Encryption Read More »

Addressing the intersection of cyber and physical security threats

Addressing the intersection of cyber and physical security threats 2025-01-21 at 07:05 By Mirko Zorz In this Help Net Security, Nicholas Jackson, Director of Cyber Operations at Bitdefender, discusses how technologies like AI, quantum computing, and IoT are reshaping cybersecurity. He shares his perspective on the new threats these advancements bring and offers practical advice

React to this headline:

Loading spinner

Addressing the intersection of cyber and physical security threats Read More »

Making the most of cryptography, now and in the future

Making the most of cryptography, now and in the future 2025-01-07 at 08:03 By Help Net Security Enterprise cryptography faces risks beyond just the advent of quantum computers. For starters, there is no guarantee that the traditional algorithms have not been broken. Though we believe that it is “unlikely” they can be, the reality is

React to this headline:

Loading spinner

Making the most of cryptography, now and in the future Read More »

The shifting security landscape: 2025 predictions and challenges

The shifting security landscape: 2025 predictions and challenges 2024-12-17 at 07:33 By Help Net Security As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s plan calls for integrated cyber defense across borders, addressing the complex, global cybersecurity challenges that businesses, governments

React to this headline:

Loading spinner

The shifting security landscape: 2025 predictions and challenges Read More »

Preparing for Q-day: The essential role of cloud migration in securing enterprise data

Preparing for Q-day: The essential role of cloud migration in securing enterprise data 2024-12-05 at 07:34 By Help Net Security As the era of quantum computing draws closer, businesses face a new and unprecedented threat to data security: “Q-day.” This looming turning point—when quantum machines can break traditional encryption with ease—has the potential to upend

React to this headline:

Loading spinner

Preparing for Q-day: The essential role of cloud migration in securing enterprise data Read More »

AI Kuru, cybersecurity and quantum computing

AI Kuru, cybersecurity and quantum computing 2024-11-25 at 08:13 By Help Net Security As we continue to delegate more infrastructure operations to artificial intelligence (AI), quantum computers are advancing towards Q-day (i.e., the day when quantum computers can break current encryption methods). This could compromise the security of digital communications, as well as autonomous control

React to this headline:

Loading spinner

AI Kuru, cybersecurity and quantum computing Read More »

How to fend off a quantum computer attack

How to fend off a quantum computer attack 2024-10-25 at 07:03 By Help Net Security In this Help Net Security video, IEEE member Marc Lijour explains quantum computing and offers insight into how to fend off a quantum computer attack. The post How to fend off a quantum computer attack appeared first on Help Net

React to this headline:

Loading spinner

How to fend off a quantum computer attack Read More »

The quantum dilemma: Game-changer or game-ender

The quantum dilemma: Game-changer or game-ender 2024-10-14 at 08:18 By Help Net Security If someone told you five years ago that you could pose questions to an AI agent about the most vexing issues in science and it could answer back swiftly and meaningfully, you would’ve thought they were joking. But AI has ushered in

React to this headline:

Loading spinner

The quantum dilemma: Game-changer or game-ender Read More »

Unlocking the power of cryptographic agility in a quantum world

Unlocking the power of cryptographic agility in a quantum world 2024-10-11 at 07:31 By Mirko Zorz In this Help Net Security interview, Glen Leonhard, Director of Key Management at Cryptomathic, discusses the role of cryptographic agility in mitigating risks posed by quantum computing. Cryptographic agility enables organizations to seamlessly transition to post-quantum algorithms without disrupting

React to this headline:

Loading spinner

Unlocking the power of cryptographic agility in a quantum world Read More »

New MIT protocol protects sensitive data during cloud-based computation

New MIT protocol protects sensitive data during cloud-based computation 2024-09-26 at 12:02 By Help Net Security Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often require powerful cloud-based servers. This dependency on cloud computing raises notable security concerns, particularly in sensitive sectors like healthcare.

React to this headline:

Loading spinner

New MIT protocol protects sensitive data during cloud-based computation Read More »

Offensive cyber operations are more than just attacks

Offensive cyber operations are more than just attacks 2024-09-23 at 07:01 By Mirko Zorz In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities surrounding offensive cyber operations. Many myths stem from a simplistic view of these operations, ranging from direct

React to this headline:

Loading spinner

Offensive cyber operations are more than just attacks Read More »

NIST releases finalized post-quantum encryption standards

NIST releases finalized post-quantum encryption standards 2024-08-14 at 06:01 By Help Net Security NIST has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer. The announced algorithms are specified in the first completed standards from NIST’s post-quantum cryptography (PQC) standardization project and are ready for immediate use. “The transition

React to this headline:

Loading spinner

NIST releases finalized post-quantum encryption standards Read More »

Shorter TLS certificate lifespans expected to complicate management efforts

Shorter TLS certificate lifespans expected to complicate management efforts 2024-08-09 at 07:01 By Help Net Security 76% of security leaders recognize the pressing need to move to shorter certificate lifespans to improve security, according to Venafi. However, many feel unprepared to take action, with 77% saying the shift to 90-day certificates will mean more outages

React to this headline:

Loading spinner

Shorter TLS certificate lifespans expected to complicate management efforts Read More »

Scroll to Top