Quantum Computing

Disappearing Keys are Impossible to Steal: the Case for Ephemeral Credentials

One of the reasons we have so many identity-related data breaches is that today's security infrastructures rely on static credentials that can be exploited. Certificates and keys must be stored and managed, which is why certificate-based environments continue to suck up more and more of [...]

Disappearing Keys are Impossible to Steal: the Case for Ephemeral Credentials2023-01-31T17:19:33+00:00

The Best Quantum Resistant Algorithm is NO Algorithm

Quantum computing presents a unique challenge for modern computing, as it has the potential to completely break the cryptographic algorithms that are currently used to secure data. New algorithms have been designed to be resistant to attacks from quantum computers, but it is becoming increasingly [...]

The Best Quantum Resistant Algorithm is NO Algorithm2023-01-25T17:18:53+00:00

Is Your Cybersecurity Cloud Computing Really That Secure?

Cybersecurity in cloud computing poses a significant challenge to organizations and their employees. Indeed, 79% of companies have experienced at least one cloud data breach, according to the State of Cloud Security Maturity 2022. Stolen credentials or malware-infected devices could shut down your network and [...]

Is Your Cybersecurity Cloud Computing Really That Secure?2022-09-21T13:25:13+00:00

Challenging the Status Quo: Quantum-Resistant vs. Quantum-Proof Cryptography

Quantum computing will upend encryption as we know it, making it critical to find post-quantum cryptography solutions. This emerging technology can compute a million calculations simultaneously, whereas a desktop computer works on one. Indeed, a 20-million-qubit computer could break Rivest-Shamir-Adleman (RSA) encryption (based on 2,048-bit [...]

Challenging the Status Quo: Quantum-Resistant vs. Quantum-Proof Cryptography2022-08-31T20:12:23+00:00
Go to Top