China’s quantum* crypto tech may be unhackable, but it’s hardly a secret

September 16, 2024 at 04:33AM China is making significant strides in quantum networking leadership and infrastructure using quantum key distribution (QKD). While this seems secure, it doubles bandwidth and has minimal practical applications due to its inefficiency and reliance on short distances. In contrast, public key cryptography is faster, more practical, and immune to quantum … Read more

Zoom adds ‘post-quantum’ encryption for video nattering

May 21, 2024 at 03:49PM Zoom has introduced post-quantum end-to-end encryption (E2EE) for video conferencing, utilizing Kyber 768 to ensure data security against potential future quantum decryption. This advanced encryption will soon be available for Phone and Rooms. While enhancing security, it may limit some Zoom features, and individual users should assess their requirements before … Read more

A Cost-Effective Encryption Strategy Starts With Key Management

May 14, 2024 at 04:09PM In today’s digital landscape, companies grapple with encryption challenges and find that a one-size-fits-all approach doesn’t suffice. While encryption is crucial for data security, managing decryption keys is equally essential. Additionally, the rising adoption of cloud services necessitates a thorough evaluation of key management practices. Finally, organizations should proactively prepare … Read more

CISO Corner: Operationalizing NIST CSF 2.0; AI Models Run Amok

March 1, 2024 at 05:44PM CISO Corner provides a weekly digest with cybersecurity articles for security operations readers and leaders. The current issue covers topics such as NIST Cybersecurity Framework 2.0, quantum-resistant encryption, managing AI models, SEC penalties for data breach disclosure, biometric regulation challenges, Iranian hacking group targeting aerospace and defense firms, microprocessor security … Read more

Apple Adds Post-Quantum Encryption to iMessage

February 21, 2024 at 09:45AM Apple introduced PQ3, a post-quantum cryptographic protocol for iMessage. This protocol aims to provide enhanced protection against future quantum computing attacks through end-to-end encryption and advanced key establishment. PQ3 will be integrated into upcoming Apple OS releases and is designed to combat potential “Harvest Now, Decrypt Later” threats. From the … Read more