Most Viewed Articles

    April 3, 2021

    Adiabatic Quantum Computing (AQC) and Its Impact on Cybersecurity

    Adiabatic Quantum Computing (AQC), and its variant Quantum Annealing, are another model for quantum computation. It's a specialized subset of…
    June 8, 2023

    Harvest Now, Decrypt Later (HNDL) Risk

    "Harvest Now, Decrypt Later" (HNDL), also known as "Store Now, Decrypt Later" (SNDL), is a concerning risk where adversaries collect…
    July 27, 2023

    Q-Day Predictions: Anticipating the Arrival of Cryptanalytically Relevant Quantum Computers (CRQC)

    While CRQCs capable of breaking current public key encryption algorithms have not yet materialized, technological advancements are pushing us towards…
    November 4, 2019

    The Quantum Computing Threat

    The secret sauce of quantum computing, which even Einstein called "spooky," is the ability to generate and manipulate quantum bits…
    June 16, 2020

    Early History of Quantum Computing

    Since the early 2000s, the field of quantum computing has seen significant advancements, both in technological development and in commercialization…
    November 1, 2021

    Ready for Quantum: Practical Steps for Cybersecurity Teams

    The journey towards quantum resistance is not merely about staying ahead of a theoretical threat but about evolving our cybersecurity…

    Latest Articles

    • FeaturedQ-Day CRQC Quantum

      Q-Day Predictions: Anticipating the Arrival of Cryptanalytically Relevant Quantum Computers (CRQC)

      While CRQCs capable of breaking current public key encryption algorithms have not yet materialized, technological advancements are pushing us towards what is ominously dubbed 'Q-Day'—the day a CRQC becomes operational. Many experts believe that Q-Day, or Y2Q as it's sometimes called, is just around the corner, suggesting it could occur by 2030 or even sooner; some speculate it may already…

      Read More »
    • Post-QuantumFidelity Quantum Computing

      Fidelity in Quantum Computing

      Fidelity in quantum computing measures the accuracy of quantum operations, including how effectively a quantum computer can perform calculations without errors. In quantum systems, noise and decoherence can degrade the coherence of quantum states, leading to errors and reduced computational accuracy. Errors are not just common; they're expected. Quantum states are delicate, easily disturbed by external factors like temperature fluctuations,…

      Read More »
    • FeaturedHarvest Now Decrypt Later HNDL

      Harvest Now, Decrypt Later (HNDL) Risk

      "Harvest Now, Decrypt Later" (HNDL), also known as "Store Now, Decrypt Later" (SNDL), is a concerning risk where adversaries collect encrypted data with the intent to decrypt it once quantum computing becomes capable of breaking current encryption methods. This is the quantum computing's ticking time bomb, with potential implications for every encrypted byte of data currently considered secure.

      Read More »
    • Post-QuantumPost Quantum Cryptography PQC Challenges

      Post-Quantum Cryptography PQC Challenges

      The transition to post-quantum cryptography is a complex, multi-faceted process that requires careful planning, significant investment, and a proactive, adaptable approach. By addressing these challenges head-on and preparing for the dynamic cryptographic landscape of the future, organizations can achieve crypto-agility and secure their digital assets against the emerging quantum threat.

      Read More »
    • Post-QuantumQuantum Resistance Enterprise Changes

      Quantum Era Demands Changes to ALL Enterprise Systems

      In my work with various clients, I frequently encounter a significant misunderstanding about the scope of preparations required to become quantum ready. Many assume that the transition to a post-quantum world will be straightforward, involving only minor patches to a few systems or simple upgrades to hardware security modules (HSMs). Unfortunately, this is a dangerous misconception. Preparing for this seismic…

      Read More »
    • Post-QuantumCrypto-Agility

      Introduction to Crypto-Agility

      As we edge closer to the Q-Day—the anticipated moment when quantum computers will be capable of breaking traditional cryptographic systems—the need for crypto-agility becomes increasingly critical. Crypto-agility is the capability of an organization to swiftly and efficiently transition between different cryptographic algorithms and protocols in response to emerging threats and technological advancements.

      Read More »
    • Post-QuantumQuantum Technologies Globe

      National Initiatives in Quantum Technologies (as of April 2022)

      As quantum technologies garner global attention, its economic and national security implications are positioning these set of technologies alongside AI and 5G as pivotal emerging technologies for the future. Governments worldwide are recognizing the strategic importance of quantum technologies, which broadly includes quantum computing, quantum communication and quantum sensing.

      Read More »
    • FeaturedReady for Quantum

      Ready for Quantum: Practical Steps for Cybersecurity Teams

      The journey towards quantum resistance is not merely about staying ahead of a theoretical threat but about evolving our cybersecurity practices in line with technological advancements. Starting preparations now ensures that organizations are not caught off guard when the landscape shifts. It’s about being informed, vigilant, and proactive—qualities essential to navigating any future technological shifts.

      Read More »
    • Post-QuantumTokenization Quantum

      Evaluating Tokenization in the Context of Quantum Readiness

      As the quantum era approaches, organizations face the daunting task of protecting their sensitive data from the looming threat of quantum computers. These powerful machines have the potential to render traditional cryptographic methods obsolete, making it imperative to explore innovative strategies for quantum readiness. One often overlooked yet highly promising approach is tokenization.

      Read More »
    • Post-QuantumQuantum Telecommunications Security

      Quantum Computing and the Looming Threat to Telecommunications Security

      Since the early 2000s, the field of quantum computing has seen significant advancements, both in technological development and in commercialization efforts. The experimental demonstration of Shor's algorithm in 2001 proved to be one of the key catalyzing events, spurring increased interest and investment from both the public and private sectors.

      Read More »