Cyber-Kinetic Security
PostQuantum.com – Industry news and blog on Quantum Computing, Quantum Security, PQC, Post-Quantum, AI Security, Cyber-Kinetic Security
-
MAS TRM Just Reset the Floor for Financial‑Sector Cybersecurity
I’ve spent the last few years in Singapore helping banks, insurers, and market infrastructure across APAC harden their environments. We’ve all said the same thing in private: we need a clear, enforceable baseline that trades vague “best practice” for concrete…
Read More » -
Cyber War – scaremongering or reality?
“Cyber war” is a term that is in recent days used so liberally that people may often wonder if these words are as menacing as they sound or used only as a tool to incite fear as a way to…
Read More » -
United We Secure: Why Cybersecurity Needs Information Sharing
The cyber battlefield is heating up. On one side, cyber criminals are pooling their knowledge like a well-oiled team; on the other, many organizations still act like lone wolves. I recall a fellow CISO remarking at a meeting, “I don’t…
Read More » -
The Decline of Real Penetration Testing
As the leader of Cyber Agency, one of the largest penetration testing and red teaming specialist outfis, I have a bone to pick with where our industry is headed. Back in the late 90s and early 2000s, "pentesting" actually meant…
Read More » -
Testing AI in Defense – A New Kind of Security Challenge
Looking back at our engagement, I'm concerned that the pace of AI adoption in military will overtake our abilities to validate and verify such systems. If AI systems continue proving valuable, there is nothing that will stop their adoption, but…
Read More » -
Polymorphic Viruses: The Shape-Shifting Malware Menace
Polymorphic viruses represent a turning point in malware history. These shape-shifting programs have shown that malicious code can be made highly adaptable, challenging the very foundations of signature-based security. We’ve examined how polymorphic malware works - using encryption, mutation engines,…
Read More » -
Social Engineering – Greatest Information Security Risk
Social engineering doesn’t have to be just a supporting process to obtain system access; it is could be even more dangerous when it is used as the main attack. We, information security defenders, rarely consider that risk. If you think…
Read More » -
“Zero Tolerance” to “80-20” – Lazy Approaches to Cyber Risk
There is a new danger lurking in the information assets of countless organizations around the globe disguised by a plan devised to protect a large portion of those assets while failing miserably to protect the rest. Zero tolerance approach to…
Read More » -
Information Security is not IT Security
Information security and IT security are often used interchangeably – even among experienced security professionals. While the two terms are related and share the common goal of protecting the confidentiality, integrity, and availability (CIA) of information, there are significant differences…
Read More » -
The Lights Are Blinking Red, and Cyber Budgets Are Blinking Off
We finally got the enterprise to look at cybersecurity. The crash slammed the door on spend just as threats professionalized and the attack surface exploded. That’s the bad news. The good news: the first 90 days of disciplined basics still…
Read More » -
Cyber-Kinetic Attacks: Safeguarding the Physical World from Digital Threats
Cyber-kinetic attacks are not science fiction but an emerging reality, as early incidents and government exercises have shown. This paper introduced the term to crystallize the concept that digital attacks can have deadly real-world effects. We have outlined how the…
Read More »



