#post-quantum-cryptography

[ follow ]
Tech industry
fromInfoQ
1 week ago

Google Cloud KMS Launches Post-Quantum KEM Support to Combat "Harvest Now, Decrypt Later" Threat

Google Cloud KMS (preview) adds post-quantum KEM support to protect long-term data confidentiality against harvest-now-decrypt-later attacks and CRQC threats.
#quantum-computing
fromIT Pro
1 week ago
Tech industry

Sundar Pichai thinks commercially viable quantum computing is just 'a few years' away

fromChannelPro
2 weeks ago
Information security

Future-proofing cybersecurity: Understanding Quantum-Safe AI and how to create resilient defences.

fromIT Pro
1 week ago
Tech industry

Sundar Pichai thinks commercially viable quantum computing is just 'a few years' away

fromChannelPro
2 weeks ago
Information security

Future-proofing cybersecurity: Understanding Quantum-Safe AI and how to create resilient defences.

fromTechzine Global
2 weeks ago

NTT DATA and Fortanix join forces to secure sensitive data

NTT DATA and Fortanix announce a global partnership to help companies transition to post-quantum cryptography. The new Cryptography-as-a-Service offering is designed to prepare organizations for the quantum era while securing AI environments. The new service combines Fortanix's Data Security Manager Platform with NTT DATA's cybersecurity expertise. The goal is clear: to support companies in securing data in AI, cloud, and hybrid environments. At the same time, organizations must prepare for the post-quantum era with crypto-agility.
Information security
fromArs Technica
3 weeks ago

Why Signal's post-quantum makeover is an amazing engineering achievement

The encryption protecting communications against criminal and nation-state snooping is under threat. As private industry and governments get closer to building useful quantum computers, the algorithms protecting Bitcoin wallets, encrypted Web visits, and other sensitive secrets will be useless. No one doubts the day will come, but as the now-common joke in cryptography circles observes, experts have been forecasting this cryptocalypse will arrive in the next 15 to 30 years for the past 30 years.
Information security
Information security
fromMedium
1 month ago

DevOps Quantum Leap: Emerging Use Cases of Quantum-Safe Cryptography

Integrate post-quantum cryptography into CI/CD pipelines now to protect secrets, keys, and infrastructure from future quantum-computer attacks.
fromInfoQ
3 weeks ago

GitHub Adds Post-Quantum Secure SSH Key Exchange to Protect Git Data in Transit

GitHub is introducing a hybrid post-quantum secure key exchange algorithm for SSH access when interacting with Git over SSH. The new algorithm, sntrup761x25519-sha512 (also known as sntrup761x25519-sha512@openssh.com), combines Streamlined NTRU Prime (a post-quantum cryptography scheme) with the classical curve X25519. This change aims to safeguard Git data against potential future threats from quantum computers that might decrypt SSH sessions recorded today.
Information security
fromMedium
1 month ago

DevOps Quantum Leap: Emerging Use Cases of Quantum-Safe Cryptography

Quantum computers are coming, and they're poised to crack the encryption that powers your DevOps pipelines. As a DevOps lead with over 16 years turning legacy systems into cloud-native powerhouses, I've seen how fragile security can be. The rise of quantum computing threatens to unravel the cryptographic foundations of our CI/CD pipelines, APIs, and cloud infrastructure. But here's the good news: quantum-safe cryptography is here
Information security
fromMedium
1 month ago

DevOps Quantum Leap: Emerging Use Cases of Quantum-Safe Cryptography

Your secrets are safe - or are they? Quantum computers are coming, and they're poised to crack the encryption that powers your DevOps pipelines. As a DevOps lead with over 16 years turning legacy systems into cloud-native powerhouses, I've seen how fragile security can be. The rise of quantum computing threatens to unravel the cryptographic foundations of our CI/CD pipelines, APIs, and cloud infrastructure.
Information security
fromNextgov.com
1 month ago

Lawmakers have filed nearly a dozen quantum amendments to FY26 NDAA

Sen. Marsha Blackburn, R-Tenn., one of the upper chamber's biggest quantum advocates, submitted four amendments: one mandating a Strategy for Quantum Readiness specifically tailored for Defense; an accompanying amendment requiring the Subcommittee on the Economic and Security Implications of Quantum Information Science to conduct an assessment of quantum-resilient network migration; another including a July 2025 bill introduced by her and Sen. Gary Peters, D-Mich., the National Quantum Cybersecurity Migration Strategy Act of 2025, in defense spending appropriations;
US politics
Information security
fromNextgov.com
1 month ago

White House in process of crafting quantum executive action

The White House plans executive actions directing federal agencies to migrate networks to post-quantum cryptography and advance quantum technology policy.
#java-25
Information security
fromComputerWeekly.com
1 month ago

Arqit to support NCSC's post-quantum cryptography pilot | Computer Weekly

Arqit will support UK organisations' migration to post-quantum cryptography by providing discovery and migration planning using its Encryption Intelligence product.
fromIT Pro
1 month ago

What will the Quantum-Safe 360 Alliance mean for your business and its post-quantum security posture?

A significant cybersecurity risk is looming on the horizon and set to disrupt your operations worldwide as soon as 2030 - or even before. That's the warning that industry giants IBM, Thales, Keyfactor and Quantinuum have echoed once again on the launch of the Quantum-Safe 360 Alliance. Quantum computing is still a nascent technology, but these machines will one day be powerful enough to break our most powerful encryption algorithms.
Information security
Software development
fromInfoWorld
1 month ago

.NET 10 moves to release candidate stage

.NET 10 Release Candidate 1 is available, includes API-complete post-quantum cryptography types and ASP.NET Core Identity metrics; general release expected in November.
Information security
fromComputerWeekly.com
2 months ago

Microsoft starts including PQC algorithms in cyber foundations | Computer Weekly

Microsoft is integrating post-quantum cryptography into core services via its Quantum Safe Programme to achieve quantum-safe systems and supply chain readiness by 2029.
Information security
fromNextgov.com
2 months ago

Microsoft announces plan to transition to quantum resilience by 2033

Microsoft will complete transition of products to post-quantum cryptography by 2033, with phased rollout starting 2029 covering foundational components, core services, and endpoints.
Privacy professionals
fromTechzine Global
2 months ago

Palo Alto Networks launches quantum-secure firewalls

Palo Alto Networks introduces tools to combat quantum threats, including a Quantum Readiness Dashboard and 14 new firewall models for future-proof security.
fromInfoQ
3 months ago

Kubernetes Introduces Post-Quantum Support for TLS

Kubernetes is ensuring its system can adapt as cryptographic standards evolve by incorporating support for hybrid key exchange algorithms, enabling gradual adoption of post-quantum secure schemes.
Software development
#cybersecurity
fromIT Pro
3 months ago
Information security

Post-quantum cryptography is now top of mind for cybersecurity leaders

fromIT Pro
3 months ago
Information security

Post-quantum cryptography is now top of mind for cybersecurity leaders

Information security
fromTNW | Data-Security
5 months ago

UK's digital defences need 'colossal' overhaul for quantum era

UK's cybersecurity needs a major overhaul to counter quantum computing threats.
Post-quantum cryptography is essential for future-proofing digital security.
Organizations must start preparing now to protect sensitive data. The NCSC sets a 2035 deadline for migration.
Cryptocurrency
fromTechzine Global
5 months ago

Windows 11 will feature cryptography that can withstand quantum computers

Windows 11 now incorporates support for post-quantum cryptography to secure data against future quantum computing threats.
Tech industry
fromTechzine Global
5 months ago

Red Hat launches RHEL 10 with intelligence and security for hybrid cloud

RHEL 10 enhances management with AI technology, addressing Linux skill shortages and improving security with post-quantum cryptography.
[ Load more ]