Upcoming Events
The era of quantum computing is closer than ever and data protection standards are shifting. Are you ready for the transition to quantum-safe security?
Join QuintessenceLabs and Carahsoft for an exclusive webinar on adopting the latest Quantum Resistant Algorithms (QRA) and crypto-agility ...
Join us for an insightful session on how QuSecure is helping federal agencies prepare for the future of cybersecurity with quantum-resilient solutions. We will cover:
New Federal Requirements: Gain insights into the latest federal mandates for implementing quantum-resilient ...
Under National Security Memorandum/NSM-10, United States government agencies and industry are directed to “prioritize the timely and equitable transition of cryptographic systems to quantum-resistant cryptography” (PQC) by 2035. Agencies require visibility of their cryptographic inventory and support for new ...
Archived Events
FIPS 140-3, titled Security Requirements for Cryptographic Modules, is the third update to the FIPS 140 benchmark established by NIST to specify the security requirements for cryptographic modules and a testing methodology for confirming ...
Advances in quantum computing technology have made traditional encryption methods ineffective, putting critical digital information at risk. The Cybersecurity and Infrastructure Security Agency (CISA) released a statement calling organizations to scan their networks and build a crypto inventory. Patero's post-quantum ...
Cryptography is everywhere. As a key security control that enables privacy, security, and trust in our digital world, it is highly regulated. Yet, after years of being a somewhat sleepy topic in the cybersecurity world, cryptography is ...
The day a cryptographically-relevant quantum computer (QRQC) with enough power to break modern encryption is coming and world governments are taking action and advising agencies and commercial entities to start taking action now. Although these powerful quantum computers won't exist for another 5 to 15 years, ...
Autonomous, AI-enabled systems will be crucial in operating enterprise networks and critical infrastructure, but their reliability and effectiveness depend on communications security. The emergence of quantum computers threatens the data and integrity of corporate, military, and intelligence ...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum ...
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a ...