top of page
Search


The end of long-trusted encryption is already scheduled; how does the actual quantum risk keep up with the schedule?
Widely deployed cryptographic algorithms like RSA and ECC—used virtually everywhere—are now on a retirement countdown. International...

Alexey
Jun 278 min read
Â
Â
Â


When the UK's top cyber watchdog speaks on quantum security, it pays to listen.
The UK's National Cyber Security Centre (NCSC) has released a timeline and set of recommendations for addressing the risks posed by...

Alexey
May 29 min read
Â
Â
Â


The Quantum-Safe Future Will Be Built Together—Or Not at All
Quantum threats are real, coordination is critical—and the past is full of reminders of what happens when the industry gets it wrong....

Alexey
Apr 245 min read
Â
Â
Â


Reading between the lines of the IEEE's PQC algorithms benchmark publication
The IEEE's recent publication titled "Benchmarking Post-Quantum TLS" ( https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10844321...

Alexey
Mar 273 min read
Â
Â
Â


Quantum risk and associated regulations
Quantum risk and associated regulations may appear distant, but they’re already here. Some standards now explicitly require action or...

Alexey
Mar 133 min read
Â
Â
Â


Each year, global quantum experts assess when quantum computers may break cryptographic security. This data can refine risk timelines and support business decision-making.
The Quantum Threat Timeline Report 2024 presents expert evaluations on the potential emergence of a quantum computer capable of breaking...

Alexey
Jan 312 min read
Â
Â
Â


The Quantum Security Timeline: Debunking Skepticism and Taking Action
Sceptics claim quantum computing will never overcome hurdles like energy use and error correction, but technological progress...

Alexey
Jan 232 min read
Â
Â
Â


The end of one-size-fits-all cryptography as governments mandate varying standards even for the same algorithms
For decades, organizations have relied on widely adopted cryptographic protocols and algorithms to secure data and communications....

Alexey
Jan 142 min read
Â
Â
Â


Key Encapsulation Mechanism explained
NIST has just published the Initial Public Draft of SP 800-227, titled "Recommendations for Key-Encapsulation Mechanisms". This document...

Alexey
Jan 81 min read
Â
Â
Â


Australia's Formal Embrace of Post-Quantum Cryptography: What Businesses Need to Know
In December 2024, Australia took a significant step forward by formally recognising the need to transition to post-quantum cryptography...

Alexey
Dec 19, 20242 min read
Â
Â
Â


AWS has revealed its plan to migrate to quantum-resistant cryptographic protocols
Amazon Web Services (AWS) has unveiled its migration plan to post-quantum cryptography (PQC). By publicly sharing this roadmap, AWS sets...

Alexey
Dec 6, 20242 min read
Â
Â
Â


Handy PQC reference from a credible source - NIST's guide to transitioning to post-quantum cryptography
The National Institute of Standards and Technology (NIST) recently released a document titled Transition to Post-Quantum Cryptography...

Alexey
Nov 18, 20241 min read
Â
Â
Â


Once seldom updated, cryptography standards now experience more frequent adjustments, signalling a move toward crypto agility.
The rise of quantum computing has led to a review of cryptographic algorithms. While similar reviews have occurred in the past, this...

Alexey
Oct 25, 20242 min read
Â
Â
Â


QKD is theoretically unbreakable and practically breakable. Don't get confused anymore about what means what.
Quantum Key Distribution (QKD) is one of the building blocks in constructing quantum-safe environments, but like many aspects of quantum...

Alexey
Oct 12, 20244 min read
Â
Â
Â


Quantum Readiness Indexes let you compare with peers and plan for the future. They also tell many other things.
Quantum Readiness Indexes provide organisations with a means to compare their progress against industry peers and prepare for the future....

Alexey
Oct 2, 20243 min read
Â
Â
Â


Singapore Adopts Quantum Key Distribution. Is the technology mature enough?
Singapore today 🇸🇬. Singtel (Singaporean telecommunications conglomerate), in partnership with ID Quantique (quantum cybersecurity...

Alexey
Sep 12, 20242 min read
Â
Â
Â


Quantum algorithms to breach encryption are advancing too, not only hardware. And it's moving rapidly.
Today, Post-Quantum Cryptography (PQC) is a new standard ( https://csrc.nist.gov/publications/fips ), and organisations are expected to...

Alexey
Sep 8, 20242 min read
Â
Â
Â


Boost your quantum smarts and expand understanding of elements that impact the quantum risk timeline with a quick bite on "CAT qubits"
Practical problems and cryptographic attacks on quantum computers make logical qubits essential. Unlike their physical counterparts,...

Alexey
Jun 19, 20244 min read
Â
Â
Â


Outdated Ciphers: The Ticking Time Bomb of 2024
Are you prepared to roll out new cryptographic standards in the coming years? Discover why updating to Post-Quantum Cryptography...

Alexey
Jun 3, 20244 min read
Â
Â
Â


Quantum algorithms are as vital as quantum hardware in disrupting cryptography. Grasping this earlier would help.
Today, I would like to connect quantum computing algorithms with the cyber security risk that quantum computing brings. A bold line...

Alexey
Apr 25, 20244 min read
Â
Â
Â
bottom of page