Please turn on your JavaScript for this page to function normally.
quantum computing
How to fend off a quantum computer attack

In this Help Net Security video, IEEE member Marc Lijour explains quantum computing and offers insight into how to fend off a quantum computer attack.

quantum computing
The quantum dilemma: Game-changer or game-ender

If someone told you five years ago that you could pose questions to an AI agent about the most vexing issues in science and it could answer back swiftly and meaningfully, you …

Glen Leonhard
Unlocking the power of cryptographic agility in a quantum world

In this Help Net Security interview, Glen Leonhard, Director of Key Management at Cryptomathic, discusses the role of cryptographic agility in mitigating risks posed by …

cloud
New MIT protocol protects sensitive data during cloud-based computation

Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often …

Christopher Jones
Offensive cyber operations are more than just attacks

In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities …

NIST
NIST releases finalized post-quantum encryption standards

NIST has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer. The announced algorithms are specified in the first …

certificates
Shorter TLS certificate lifespans expected to complicate management efforts

76% of security leaders recognize the pressing need to move to shorter certificate lifespans to improve security, according to Venafi. However, many feel unprepared to take …

quantum computing
Preparing for Q-Day as NIST nears approval of PQC standards

Q-Day—the day when a cryptographically relevant quantum computer can break most forms of modern encryption—is fast approaching, leaving the complex systems our societies rely …

quantum computing
Preparing for a post-quantum future

Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This …

servers
Surviving the “quantum apocalypse” with fully homomorphic encryption

In the past few years, an increasing number of tech companies, organizations, and even governments have been working on one of the next big things in the tech world: …

quantum computing
Adapting cybersecurity for the quantum computing era

Researchers are exploring promising quantum computing applications across various domains, from cryptography and optimization problems to drug discovery and artificial …

lock
From PKI to PQC: Devising a strategy for the transition

Quantum computers capable of breaking currently used encryption algorithms are an inevitability. And since the US, China and Europe are sprinting to win that arms race, we …

Don't miss

Cybersecurity news