Archived Events
Under National Security Memorandum/NSM-10, United States government agencies and industry are directed to “prioritize the timely and equitable transition of cryptographic systems to quantum-resistant cryptography” (PQC) by 2035. Agencies require visibility of their cryptographic inventory and support for new ...
The era of quantum computing is closer than ever and data protection standards are shifting. Are you ready for the transition to quantum-safe security?
QuintessenceLabs and Carahsoft hosted an exclusive webinar on adopting the latest Quantum Resistant Algorithms (QRA) and crypto-agility ...
QuSecure presented an insightful session on how they are helping federal agencies prepare for the future of cybersecurity with quantum-resilient solutions. Topics included:
New Federal Requirements: Gain insights into the latest federal mandates for implementing quantum-resilient ...
FIPS 140-3, titled Security Requirements for Cryptographic Modules, is the third update to the FIPS 140 benchmark established by NIST to specify the security requirements for cryptographic modules and a testing methodology for confirming ...
Advances in quantum computing technology have made traditional encryption methods ineffective, putting critical digital information at risk. The Cybersecurity and Infrastructure Security Agency (CISA) released a statement calling organizations to scan their networks and build a crypto inventory. Patero's post-quantum ...
Cryptography is everywhere. As a key security control that enables privacy, security, and trust in our digital world, it is highly regulated. Yet, after years of being a somewhat sleepy topic in the cybersecurity world, cryptography is ...
The day a cryptographically-relevant quantum computer (QRQC) with enough power to break modern encryption is coming and world governments are taking action and advising agencies and commercial entities to start taking action now. Although these powerful quantum computers won't exist for another 5 to 15 years, ...
Autonomous, AI-enabled systems will be crucial in operating enterprise networks and critical infrastructure, but their reliability and effectiveness depend on communications security. The emergence of quantum computers threatens the data and integrity of corporate, military, and intelligence ...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum ...
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a ...