Remove cyber-risk now-is-the-time-to-plan-for-post-quantum-cryptography
article thumbnail

How 5G Operators Can Prepare for The Quantum Era

Thales Cloud Protection & Licensing

How 5G Operators Can Prepare for The Quantum Era madhav Tue, 01/30/2024 - 05:25 The Quantum State of Play in 5G Quantum computing has found theoretical application in modern computation systems, including cellular networks like 5G. However, many of these protocols are at risk due to their vulnerability to quantum attacks.

Risk 71
article thumbnail

DHS And NIST Release Guidance for The Adoption of Post-Quantum Cryptography

Thales Cloud Protection & Licensing

DHS And NIST Release Guidance for The Adoption of Post-Quantum Cryptography. The transition to post-quantum encryption algorithms is as much dependent on the development of such algorithms as it is on their adoption. While the former is already ongoing, planning for the latter remains in its infancy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Key Takeaways from the recently announced NIST Post-Quantum Cryptography Standards

Thales Cloud Protection & Licensing

3 Key Takeaways from the recently announced NIST Post-Quantum Cryptography Standards madhav Thu, 09/07/2023 - 05:16 The world relies on many protective measures today, even if it isn’t something you notice. This is "as expected" and follows a long-time pattern for NIST.

article thumbnail

SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

The Last Watchdog

There’s little doubt that the shift to quantum computing will open new horizons of digital commerce. But it’s also plain as day that the mainstreaming of quantum processing power will profoundly exacerbate cybersecurity exposures. Germany and Japan. The study, sponsored by DigiCert, Inc., The study, sponsored by DigiCert, Inc.,

article thumbnail

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. The same goes with the advent of Quantum Computing , which is supposed to bring exponential computing power that shall not only bring endless benefits but also raises question marks on the current state of cryptography that is the bedrock of all information security as we know today.

article thumbnail

Global October Cybersecurity Events: Where You Can Find Thales

Thales Cloud Protection & Licensing

The summer is now over, and October is a month full of cybersecurity events for Thales around the world. Along with celebrating Cyber Security Awareness Month, several exciting events are taking place across the world, aiming to educate people on the latest trends in cybersecurity and privacy. Thu, 10/06/2022 - 06:55.