All Post-Quantum, PQC Posts
-
Post-Quantum, PQC, Quantum Security
Pick One Layer: How to Choose the Post-Quantum Migration That Protects the Most
Recent research proves one post-quantum layer can protect all payload confidentiality. But which layer should you migrate first? Six enterprise architecture scenarios analyzed.
Read More » -
Post-Quantum, PQC, Quantum Security
The Anatomy of Quantum Denial: What Bitcoin’s Response to the Quantum Threat Teaches Every CISO
At Bitcoin 2026, the same main stage hosted engineers building quantum-resistant upgrades and a trio claiming quantum computers can never work because Bitcoin proves time is discrete. The dysfunction that produced this scene plays out in every enterprise boardroom facing PQC migration.
Read More » -
Post-Quantum, PQC, Quantum Security
Crypto-Agility Is an Architecture Problem, Not a Library Swap
Every PQC migration guide tells you to "be crypto-agile." After leading migrations at Fortune Global 500 scale, I can tell you where that advice fails: HSMs that can't upgrade, protocols with hard-coded algorithms, and embedded devices that will outlive the cryptography they verify.
Read More » -
Post-Quantum, PQC, Quantum Security
The Signature Supply Chain: How Deep Does Digital Trust Go?
From TPM attestation keys to container image signatures, modern systems depend on dozens of signature layers most security teams have never fully mapped. This deep dive exposes the full anatomy of the trust infrastructure a quantum computer would compromise.
Read More » -
Post-Quantum, PQC, Quantum Security
PQC Standards Fragmentation: What Multinationals Must Plan For Now
Your New York office runs ML-KEM per NIST. Your Frankfurt office needs ANSSI-recommended hybrids. Your Shanghai office will require Chinese ICCS algorithms. Your Seoul subsidiary uses KpqC. You need one migration plan. This article maps how to build it.
Read More » -
Quantum Computing
The Decoder Bottleneck: The CRQC Challenge Nobody Is Talking About
Qubit count gets the headlines. Error rates get the analysis. But the classical decoder that must process millions of error signals per second in real time gets almost no attention outside the QEC research community. It may be the capability that determines the CRQC timeline.
Read More » -
Post-Quantum, PQC, Quantum Security
Grover’s Algorithm vs AES – Why “Ignore It” Is Almost Right
The consensus says Grover will never break AES-128. The math checks out on today's assumptions. But those assumptions are built on surface codes and superconducting hardware, and the ground is already shifting. Scan the quantum computing coverage of Bitcoin and you will find a remarkable pattern. Article after article cites the same RSA-2048 qubit estimates - 20 million physical qubits (Gidney-Ekerå 2021), under a million…
Read More » -
Post-Quantum, PQC, Quantum Security
PQC Signature Migration Before Encryption: Why Trust Infrastructure Comes First
Most PQC migration guides tell you to protect data first. But recent research confirms that signature algorithms fall faster, and the blast radius of a compromised signing key dwarfs that of a decrypted session. Here's why I'm telling CISOs to flip the sequence.
Read More »