Please turn on your JavaScript for this page to function normally.
lock
Crypto asset discovery and the post-quantum migration

Quantum computing is reshaping our world and will revolutionize many industries, including materials science, life sciences, transportation, and energy. Google recently …

quantum computing
Security in the impending age of quantum computers

Quantum computing is poised to be one of the most important technologies of the 21st century. With global governments having collectively pledged more than $38 billion in …

Signal app
Signal takes a quantum leap with E2EE protocol upgrade

Signal has announced an upgrade to its end-to-end encryption (E2EE) protocol to protect users of its popular messaging app from encryption-breaking attacks through quantum …

numbers
New quantum random number generator could revolutionize encryption

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption developed at …

quantum computing
Real-world examples of quantum-based attacks

Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from …

quantum computing
Quantum computing’s threat to national security

In this Help Net Security video, Denis Mandich, CTO at Qrypt, talks about quantum computing. If we thought AI turned security and privacy on their head, quantum computing will …

Atsushi Yamada
Navigating the quantum leap in cybersecurity

In this Help Net Security interview, we sit down with Dr. Atsushi Yamada, the newly appointed CEO of ISARA, a security solutions company specializing in creating quantum-safe …

numbers
Expected advancements in quantum cryptography

Quantum computing has surged in popularity recently, with its revolutionary computational capabilities transforming the technology sector. While some are skeptical of its …

AI
Post-quantum cybersecurity threats loom large

A new Zapata Computing report reveals a deepening commitment from enterprises that points to a maturing industry with widespread, global interest and increased urgency …

lock
Q-Day doesn’t equal doomsday: Enacting an enterprise quantum security strategy

While Quantum Day, or “Q-Day,” may be five to ten years away, it is arriving faster than we would like. Q-Day represents the day that quantum computers will reliably use the …

Signal app
Researchers publish post-quantum upgrade to the Signal protocol

PQShield published a white paper that lays out the quantum threat to secure end-to-end messaging and explains how post-quantum cryptography (PQC) can be added to the Signal …

lock
Researchers create key tech for quantum cryptography commercialization

In modern cryptosystems, users generate public and private keys that guarantee security based on computational complexity and use them to encrypt and decrypt information. …

Don't miss

Cybersecurity news