#post-quantum-cryptography

[ follow ]
Information security
fromTechzine Global
2 days ago

Cisco boosts phase-out of insecure legacy with new initiative

Cisco is retiring insecure legacy features and enforcing secure-by-default configurations across networking platforms to defend against AI-driven attacks and prepare for post-quantum cryptography.
#quantum-computing
fromIT Pro
1 month ago
Tech industry

Sundar Pichai thinks commercially viable quantum computing is just 'a few years' away

fromChannelPro
1 month ago
Information security

Future-proofing cybersecurity: Understanding Quantum-Safe AI and how to create resilient defences.

fromIT Pro
1 month ago
Tech industry

Sundar Pichai thinks commercially viable quantum computing is just 'a few years' away

fromChannelPro
1 month ago
Information security

Future-proofing cybersecurity: Understanding Quantum-Safe AI and how to create resilient defences.

Information security
fromInfoWorld
1 week ago

Red Hat Linux bolsters AI assistance

RHEL delivers validated AI accelerator drivers, backports critical updates, and enhances post-quantum TLS protections across RHEL 9.7 and 10.1.
#ssh
fromInfoQ
1 week ago
Information security

GitHub Rolls Out Post-Quantum SSH Security to Protect Code from Future Threats

fromInfoQ
1 month ago
Information security

GitHub Adds Post-Quantum Secure SSH Key Exchange to Protect Git Data in Transit

fromInfoQ
1 week ago
Information security

GitHub Rolls Out Post-Quantum SSH Security to Protect Code from Future Threats

fromInfoQ
1 month ago
Information security

GitHub Adds Post-Quantum Secure SSH Key Exchange to Protect Git Data in Transit

Artificial intelligence
fromInfoWorld
1 week ago

Red Hat OpenShift 4.20 boosts AI workloads, security

Red Hat OpenShift 4.20 releases AI-focused features (LeaderWorkerSet API, image volume source, MCP) and strengthened security including initial post-quantum cryptography support and Platform Plus enhancements.
fromInfoWorld
1 week ago

Microsoft's .NET 10 arrives with AI, runtime, and language improvements

For cryptography, .NET 10 introduces extensive new APIs across cryptography, globalization, numerics, serialization, collections, and diagnostics. Also, with quantum computing on the horizon, .NET 10 expands post-quantum cryptography support with Windows Cryptography API: Next Generation (CNG) support, enhanced ML-DSA with simplified APIs, and HashML-DSA support, plus Composite ML-DSA for hybrid approaches. Additional cryptography enhancements include AES KeyWrap with Padding support for secure key wrapping scenarios.
Information security
Tech industry
fromInfoQ
4 weeks ago

Google Cloud KMS Launches Post-Quantum KEM Support to Combat "Harvest Now, Decrypt Later" Threat

Google Cloud KMS (preview) adds post-quantum KEM support to protect long-term data confidentiality against harvest-now-decrypt-later attacks and CRQC threats.
fromTechzine Global
1 month ago

NTT DATA and Fortanix join forces to secure sensitive data

NTT DATA and Fortanix announce a global partnership to help companies transition to post-quantum cryptography. The new Cryptography-as-a-Service offering is designed to prepare organizations for the quantum era while securing AI environments. The new service combines Fortanix's Data Security Manager Platform with NTT DATA's cybersecurity expertise. The goal is clear: to support companies in securing data in AI, cloud, and hybrid environments. At the same time, organizations must prepare for the post-quantum era with crypto-agility.
Information security
fromArs Technica
1 month ago

Why Signal's post-quantum makeover is an amazing engineering achievement

The encryption protecting communications against criminal and nation-state snooping is under threat. As private industry and governments get closer to building useful quantum computers, the algorithms protecting Bitcoin wallets, encrypted Web visits, and other sensitive secrets will be useless. No one doubts the day will come, but as the now-common joke in cryptography circles observes, experts have been forecasting this cryptocalypse will arrive in the next 15 to 30 years for the past 30 years.
Information security
Information security
fromMedium
2 months ago

DevOps Quantum Leap: Emerging Use Cases of Quantum-Safe Cryptography

Integrate post-quantum cryptography into CI/CD pipelines now to protect secrets, keys, and infrastructure from future quantum-computer attacks.
fromMedium
2 months ago

DevOps Quantum Leap: Emerging Use Cases of Quantum-Safe Cryptography

Quantum computers are coming, and they're poised to crack the encryption that powers your DevOps pipelines. As a DevOps lead with over 16 years turning legacy systems into cloud-native powerhouses, I've seen how fragile security can be. The rise of quantum computing threatens to unravel the cryptographic foundations of our CI/CD pipelines, APIs, and cloud infrastructure. But here's the good news: quantum-safe cryptography is here
Information security
fromMedium
2 months ago

DevOps Quantum Leap: Emerging Use Cases of Quantum-Safe Cryptography

Your secrets are safe - or are they? Quantum computers are coming, and they're poised to crack the encryption that powers your DevOps pipelines. As a DevOps lead with over 16 years turning legacy systems into cloud-native powerhouses, I've seen how fragile security can be. The rise of quantum computing threatens to unravel the cryptographic foundations of our CI/CD pipelines, APIs, and cloud infrastructure.
Information security
fromNextgov.com
1 month ago

Lawmakers have filed nearly a dozen quantum amendments to FY26 NDAA

Sen. Marsha Blackburn, R-Tenn., one of the upper chamber's biggest quantum advocates, submitted four amendments: one mandating a Strategy for Quantum Readiness specifically tailored for Defense; an accompanying amendment requiring the Subcommittee on the Economic and Security Implications of Quantum Information Science to conduct an assessment of quantum-resilient network migration; another including a July 2025 bill introduced by her and Sen. Gary Peters, D-Mich., the National Quantum Cybersecurity Migration Strategy Act of 2025, in defense spending appropriations;
US politics
Information security
fromNextgov.com
2 months ago

White House in process of crafting quantum executive action

The White House plans executive actions directing federal agencies to migrate networks to post-quantum cryptography and advance quantum technology policy.
#java-25
Information security
fromComputerWeekly.com
2 months ago

Arqit to support NCSC's post-quantum cryptography pilot | Computer Weekly

Arqit will support UK organisations' migration to post-quantum cryptography by providing discovery and migration planning using its Encryption Intelligence product.
fromIT Pro
2 months ago

What will the Quantum-Safe 360 Alliance mean for your business and its post-quantum security posture?

A significant cybersecurity risk is looming on the horizon and set to disrupt your operations worldwide as soon as 2030 - or even before. That's the warning that industry giants IBM, Thales, Keyfactor and Quantinuum have echoed once again on the launch of the Quantum-Safe 360 Alliance. Quantum computing is still a nascent technology, but these machines will one day be powerful enough to break our most powerful encryption algorithms.
Information security
Software development
fromInfoWorld
2 months ago

.NET 10 moves to release candidate stage

.NET 10 Release Candidate 1 is available, includes API-complete post-quantum cryptography types and ASP.NET Core Identity metrics; general release expected in November.
Information security
fromComputerWeekly.com
3 months ago

Microsoft starts including PQC algorithms in cyber foundations | Computer Weekly

Microsoft is integrating post-quantum cryptography into core services via its Quantum Safe Programme to achieve quantum-safe systems and supply chain readiness by 2029.
Information security
fromNextgov.com
3 months ago

Microsoft announces plan to transition to quantum resilience by 2033

Microsoft will complete transition of products to post-quantum cryptography by 2033, with phased rollout starting 2029 covering foundational components, core services, and endpoints.
Privacy professionals
fromTechzine Global
3 months ago

Palo Alto Networks launches quantum-secure firewalls

Palo Alto Networks introduces tools to combat quantum threats, including a Quantum Readiness Dashboard and 14 new firewall models for future-proof security.
fromInfoQ
3 months ago

Kubernetes Introduces Post-Quantum Support for TLS

Kubernetes is ensuring its system can adapt as cryptographic standards evolve by incorporating support for hybrid key exchange algorithms, enabling gradual adoption of post-quantum secure schemes.
Software development
#cybersecurity
fromIT Pro
4 months ago
Information security

Post-quantum cryptography is now top of mind for cybersecurity leaders

fromIT Pro
4 months ago
Information security

Post-quantum cryptography is now top of mind for cybersecurity leaders

Information security
fromTNW | Data-Security
6 months ago

UK's digital defences need 'colossal' overhaul for quantum era

UK's cybersecurity needs a major overhaul to counter quantum computing threats.
Post-quantum cryptography is essential for future-proofing digital security.
Organizations must start preparing now to protect sensitive data. The NCSC sets a 2035 deadline for migration.
Cryptocurrency
fromTechzine Global
5 months ago

Windows 11 will feature cryptography that can withstand quantum computers

Windows 11 now incorporates support for post-quantum cryptography to secure data against future quantum computing threats.
Tech industry
fromTechzine Global
6 months ago

Red Hat launches RHEL 10 with intelligence and security for hybrid cloud

RHEL 10 enhances management with AI technology, addressing Linux skill shortages and improving security with post-quantum cryptography.
[ Load more ]