Podcasts about pqc

  • 51PODCASTS
  • 129EPISODES
  • 31mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jun 10, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about pqc

Latest podcast episodes about pqc

Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Ep. 246 Thales Powers Federal Data Security Against Quantum-Era Threats

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later Jun 10, 2025 25:40


Connect to John Gilroy on LinkedIn   https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Years ago, the headline “Data Breach” was shocking; today, it is common. That may not be a problem for some, but the federal government maintains data stores that contain information about finances, health, and military matters. A recent report has shown that 50% of federal agencies have reported data breaches. It appears that it's time to find a solution. Today, we sat down with Blain Canavan from Thales Group to examine the usual suspects and the potential threats ahead. THE USUAL SUSPECTS:   MFA:  Protecting data can be accomplished with something as basic as phishing-resistant Multi-Factor Authentication. The first step in identity management can significantly reduce threats. Encryption: Deploying encryption can protect data at rest, in transit, and memory. Keys to the Kingdom: Little-known methods of managing the PKI system can help reduce risk in protecting data. THEAT DOWN THE ROAD: QUANTUM Now that you have checked the boxes for basic data protection, it is time to get a grasp on what lies ahead. We have read about quantum cryptography for twenty years. Today, we have pre-standardized quantum-resistant cryptographic algorithms available. One needs to take action a little sooner. During the interview, Blair Canavan highlights the proactive measures taken by the US federal government, including the implementation of PQC-safe digital signatures by 2025. The “down the road” also has a delimitation -- Blair emphasizes the urgency of replacing outdated cryptographic methods, such as RSA and ECC, by 2030 and 2035, respectively. Include the 2024 data threat report. = ==

Root Causes: A PKI and Security Podcast
Root Causes 503: What Are Hybrid and Composite PQC?

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Jun 6, 2025 8:03


We explain the difference between two strategies of PQC implementation, which we call hybrid and composite.

Root Causes: A PKI and Security Podcast
Root Causes 502: The PQC Game of Chicken

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Jun 4, 2025 10:59


In this episode Jason explains the fallacy of "playing chicken" with the Quantum Apocalypse. We discuss stack ranking and "eyes open" PQC risk decisions.

Paul's Security Weekly
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397

Paul's Security Weekly

Play Episode Listen Later May 28, 2025 67:59


This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional firewalls. From cutting-edge innovations to expert insights, discover what security leaders should prioritize to stay ahead of evolving threats. This segment is sponsored by Zero Networks. Visit https://securityweekly.com/zerorsac to learn more about them! In this segment, Keyfactor CSO Chris Hickman takes stock of industry progress towards quantum-resistant cryptography. Using recent guidance from NIST and his company's data on which certificates and keys pose the largest threats to organization now, Chris unpacks what it means to be risk intelligent and quantum safe. Segment Resources: • Command Risk Intelligence press release: https://www.keyfactor.com/press-releases/keyfactor-unveils-worlds-first-certificate-risk-management-solution/ • Recent blog post on the transition to PQC: https://www.keyfactor.com/blog/getting-quantum-ready-why-2030-matters-for-post-quantum-cryptography/ To learn more about the road to being quantum ready, stop by Keyfactor's booth at the conference, number #748, or visit: https://securityweekly.com/keyfactorrsac As cyber threats become increasingly difficult to detect and the technology to combat them continues to evolve, organizations must be prepared to move faster than ever. Looking ahead, the rise of post-quantum computing will bring both new opportunities and challenges, further reshaping the cybersecurity landscape. With the launch of Entrust's Cryptographic Security Platform (announcement coming April 16th) as a backdrop, Jordan can discuss why all organizations – large and small – must prioritize post-quantum preparedness before it's too late. He can also address emerging fraud technologies (e.g., deepfakes, GenAI) and fraud attacks (account takeovers, synthetic identities, impersonation), which are drawing more attention to the need for cyber-resilient methods, such as post-quantum cryptography, to protect against new fraud risks in the digital future. This segment is sponsored by Entrust. Visit https://securityweekly.com/entrustrsac to learn more about them! As quantum computing advances, the security foundations of our digital world face unprecedented challenges. This session explores how integrating Public Key Infrastructure (PKI) and Domain Name System (DNS) technologies can fortify digital trust in the quantum era. We'll delve into strategies for transitioning to post-quantum cryptography, ensuring interoperability, and maintaining the integrity of digital communications. Join us to understand the roadmap for achieving quantum resilience and safeguarding the future of digital trust. Segment Resources: https://www.digicert.com/what-is-pki https://www.digicert.com/faq/dns https://www.digicert.com/faq/dns/what-is-dns https://www.linkedin.com/posts/amitsinhadigitaltrust-trustsummit-pki-activity-7315749270505037824-lUBf?utmsource=share&utmmedium=memberdesktop&rcm=ACoAAAC22mYBCeB_s0YvGTVQsGiChh7wRXa4jRg https://www.digicert.com/blog/compliance-the-foundation-of-digital-trust https://www.digicert.com/blog/digital-trust-as-an-it-imperative This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-397

Business Security Weekly (Audio)
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397

Business Security Weekly (Audio)

Play Episode Listen Later May 28, 2025 67:59


This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional firewalls. From cutting-edge innovations to expert insights, discover what security leaders should prioritize to stay ahead of evolving threats. This segment is sponsored by Zero Networks. Visit https://securityweekly.com/zerorsac to learn more about them! In this segment, Keyfactor CSO Chris Hickman takes stock of industry progress towards quantum-resistant cryptography. Using recent guidance from NIST and his company's data on which certificates and keys pose the largest threats to organization now, Chris unpacks what it means to be risk intelligent and quantum safe. Segment Resources: • Command Risk Intelligence press release: https://www.keyfactor.com/press-releases/keyfactor-unveils-worlds-first-certificate-risk-management-solution/ • Recent blog post on the transition to PQC: https://www.keyfactor.com/blog/getting-quantum-ready-why-2030-matters-for-post-quantum-cryptography/ To learn more about the road to being quantum ready, stop by Keyfactor's booth at the conference, number #748, or visit: https://securityweekly.com/keyfactorrsac As cyber threats become increasingly difficult to detect and the technology to combat them continues to evolve, organizations must be prepared to move faster than ever. Looking ahead, the rise of post-quantum computing will bring both new opportunities and challenges, further reshaping the cybersecurity landscape. With the launch of Entrust's Cryptographic Security Platform (announcement coming April 16th) as a backdrop, Jordan can discuss why all organizations – large and small – must prioritize post-quantum preparedness before it's too late. He can also address emerging fraud technologies (e.g., deepfakes, GenAI) and fraud attacks (account takeovers, synthetic identities, impersonation), which are drawing more attention to the need for cyber-resilient methods, such as post-quantum cryptography, to protect against new fraud risks in the digital future. This segment is sponsored by Entrust. Visit https://securityweekly.com/entrustrsac to learn more about them! As quantum computing advances, the security foundations of our digital world face unprecedented challenges. This session explores how integrating Public Key Infrastructure (PKI) and Domain Name System (DNS) technologies can fortify digital trust in the quantum era. We'll delve into strategies for transitioning to post-quantum cryptography, ensuring interoperability, and maintaining the integrity of digital communications. Join us to understand the roadmap for achieving quantum resilience and safeguarding the future of digital trust. Segment Resources: https://www.digicert.com/what-is-pki https://www.digicert.com/faq/dns https://www.digicert.com/faq/dns/what-is-dns https://www.linkedin.com/posts/amitsinhadigitaltrust-trustsummit-pki-activity-7315749270505037824-lUBf?utmsource=share&utmmedium=memberdesktop&rcm=ACoAAAC22mYBCeB_s0YvGTVQsGiChh7wRXa4jRg https://www.digicert.com/blog/compliance-the-foundation-of-digital-trust https://www.digicert.com/blog/digital-trust-as-an-it-imperative This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-397

Business Security Weekly (Video)
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Amit Sinha, Chris Hickman, Albert Estevez Polo, Jordan Avnaim - BSW #397

Business Security Weekly (Video)

Play Episode Listen Later May 28, 2025 67:59


This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional firewalls. From cutting-edge innovations to expert insights, discover what security leaders should prioritize to stay ahead of evolving threats. This segment is sponsored by Zero Networks. Visit https://securityweekly.com/zerorsac to learn more about them! In this segment, Keyfactor CSO Chris Hickman takes stock of industry progress towards quantum-resistant cryptography. Using recent guidance from NIST and his company's data on which certificates and keys pose the largest threats to organization now, Chris unpacks what it means to be risk intelligent and quantum safe. Segment Resources: • Command Risk Intelligence press release: https://www.keyfactor.com/press-releases/keyfactor-unveils-worlds-first-certificate-risk-management-solution/ • Recent blog post on the transition to PQC: https://www.keyfactor.com/blog/getting-quantum-ready-why-2030-matters-for-post-quantum-cryptography/ To learn more about the road to being quantum ready, stop by Keyfactor's booth at the conference, number #748, or visit: https://securityweekly.com/keyfactorrsac As cyber threats become increasingly difficult to detect and the technology to combat them continues to evolve, organizations must be prepared to move faster than ever. Looking ahead, the rise of post-quantum computing will bring both new opportunities and challenges, further reshaping the cybersecurity landscape. With the launch of Entrust's Cryptographic Security Platform (announcement coming April 16th) as a backdrop, Jordan can discuss why all organizations – large and small – must prioritize post-quantum preparedness before it's too late. He can also address emerging fraud technologies (e.g., deepfakes, GenAI) and fraud attacks (account takeovers, synthetic identities, impersonation), which are drawing more attention to the need for cyber-resilient methods, such as post-quantum cryptography, to protect against new fraud risks in the digital future. This segment is sponsored by Entrust. Visit https://securityweekly.com/entrustrsac to learn more about them! As quantum computing advances, the security foundations of our digital world face unprecedented challenges. This session explores how integrating Public Key Infrastructure (PKI) and Domain Name System (DNS) technologies can fortify digital trust in the quantum era. We'll delve into strategies for transitioning to post-quantum cryptography, ensuring interoperability, and maintaining the integrity of digital communications. Join us to understand the roadmap for achieving quantum resilience and safeguarding the future of digital trust. Segment Resources: https://www.digicert.com/what-is-pki https://www.digicert.com/faq/dns https://www.digicert.com/faq/dns/what-is-dns https://www.linkedin.com/posts/amitsinhadigitaltrust-trustsummit-pki-activity-7315749270505037824-lUBf?utmsource=share&utmmedium=memberdesktop&rcm=ACoAAAC22mYBCeB_s0YvGTVQsGiChh7wRXa4jRg https://www.digicert.com/blog/compliance-the-foundation-of-digital-trust https://www.digicert.com/blog/digital-trust-as-an-it-imperative This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them! Show Notes: https://securityweekly.com/bsw-397

Root Causes: A PKI and Security Podcast
Root Causes 498: UK NCSC PQC Guidance

Root Causes: A PKI and Security Podcast

Play Episode Listen Later May 23, 2025 15:31


The UK National Cyber Security Centre (NCSC) has released new PQC guidance. We take exception to the dates it gives and explain why.

Root Causes: A PKI and Security Podcast
Root Causes 497: PQC Update with Sofia Celi

Root Causes: A PKI and Security Podcast

Play Episode Listen Later May 21, 2025 19:50


Guest Sofia Celi (IETF, Brave) returns to talk about important developments in post quantum cryptography. Sofia tells us about her candidate algorithm MAYO and what is happening with the NIST PQC onramp. We learn about KEM TLS and the status of PQC initiatives in IETF.

Passwort - der Podcast von heise security
Quantencomputer und wie man sich vor ihnen schützt

Passwort - der Podcast von heise security

Play Episode Listen Later May 21, 2025 66:25


Quantencomputer bedrohen die ganze Kryptografie… die ganze? Nein! Sylvester lässt sich von seinen Kolleg:innen Dr. Sabrina Patsch und Wilhelm Drehling erklären, welche Algorithmen Quantencomputer tatsächlich bedrohen und wofür sie kein Problem darstellen. Die drei erörtern auch, wie weit real existierende Maschinen von diesen Fähigkeiten noch entfernt sind, warum man sich dennoch bereits Sorgen macht und welche – oft gar nicht so neuen – Verfahren vor Quantencomputern schützen. - Übersichtsseite zum PQC-Standardisierungsprojekt des NIST https://www.nist.gov/pqcrypto - Weiterführender Artikel zum aktuellen Stand der Entwicklung von Quantencomputern https://heise.de/-10349382 - Weiterführender Artikel zu Kryptoagilität und Post-Quanten- Kryptografie https://heise.de/-10337485 - Cloudflares Zufallsgeneratoren https://blog.cloudflare.com/chaos-in-cloudflare-lisbon-office-securing-the-internet-with-wave-motion/ - Das AMA wird in diesem Subreddit stattfinden https://www.reddit.com/r/de_EDV/ Mitglieder unserer Security Community auf heise security PRO hören alle Folgen bereits zwei Tage früher. Mehr Infos: https://pro.heise.de/passwort

Root Causes: A PKI and Security Podcast
Root Causes 495: Trust Models and Post Quantum Cryptography

Root Causes: A PKI and Security Podcast

Play Episode Listen Later May 16, 2025 7:00


We build on our Trust Models discussion to explore how organizations can structure their PKI for the transition to post quantum cryptography (PQC).

The Post-Quantum World
Moving Companies to PQC VPN — with American Binary

The Post-Quantum World

Play Episode Listen Later May 14, 2025 35:41


Post-quantum cryptography is rapidly moving from the realm of NIST standards to running in production. The threat of quantum computing advances and coming regulations are driving this acceleration. One major component on the PQC migration plan for companies is VPN. In this episode we look at the Ambit corporate VPN client, which uses a standardized NIST PQC cipher: ML-KEM. Did you know there are potential gotchas with trying hybrids of classical and PQC instead? Find out the technical and philosophical reasons why the developers chose to skip offering a hybrid option. Join host Konstantinos Karagiannis for a wide-ranging chat with Kevin Kane and Andrew McElroy from American Binary.  For more information on American Binary, visit https://www.ambit.inc/.  Visit Protiviti at https://www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech.               Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

Cybercrime Magazine Podcast
Quantum Minute. Post-Quantum Cryptography Guidance From UK's NCSC. Sponsored by Applied Quantum.

Cybercrime Magazine Podcast

Play Episode Listen Later May 9, 2025 1:55


The UK's National Cyber Security Centre (NCSC) has provided formal guidance to system and risk owners in various industry sectors about how to prepare for the migration to post-quantum cryptography. While symmetric cryptography is not significantly impacted by quantum technology, the NCSC said PQC will eventually replace vulnerable PKC algorithms, providing secure alternatives for key establishment and digital signatures. System owners are advised to start planning for integration of PQC into their infrastructure, with the migration likely happening seamlessly through software updates for commodity IT – but requiring more effort for bespoke or enterprise IT systems. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

The Post-Quantum World
Quantum Hype Check — with Anastasia Marchenkova

The Post-Quantum World

Play Episode Listen Later Apr 30, 2025 56:18


Quantum computing is a fast-moving field, and not just when photons are involved. Join host Konstantinos Karagiannis for a wide-ranging chat with Anastasia Marchenkova, where they cover recent developments and potential future outcomes. Topics include: chip hype, logical qubits, imminent practical business use cases, quantum random numbers, the implications of AI in quantum coding, investing, and networking or interconnect. Get caught up with the industry in this supersized episode.  For more information on what Anastasia is up to, visit www.amarchenkova.com/.  Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

The Cybersecurity Institute Podcast, by Entrust
The Race to Re-encrypt the World Before Q-Day: Your Top Questions Answered

The Cybersecurity Institute Podcast, by Entrust

Play Episode Listen Later Apr 24, 2025 21:52


In this podcast, we'll delve into the key cybersecurity challenges associated with the arrival of Q-Day, what is needed to attain and maintain a Zero Trust strategy in the post quantum era and offer practical guidance on how to facilitate the cryptographic transition to post quantum cryptography (PQC). 

Nodesignal - Deine Bitcoin-Frequenz
Nodesignal-Talk - E227 - “Was ist Post Quantum Cryptography?” mit Hanna von Tuta (PQC 1/2)

Nodesignal - Deine Bitcoin-Frequenz

Play Episode Listen Later Apr 18, 2025 46:13 Transcription Available


In der heutigen Folge spricht Chris mit Hanna von Tuta über die Notwendigkeit, sich jetzt schon Gedanken über Post-Quantum-Cryptography zu machen. Mit dieser Folge starten wir eine kleine Serie zum Thema Post-Quanten-Kryptografie. Der Grund: Quantencomputer entwickeln sich rasant weiter und könnten schon bald klassische Verschlüsselung bedrohen – mit möglichen Folgen für unsere gesamte digitale Infrastruktur, inklusive Bitcoin. In dieser Reihe schauen wir uns an, wie real die Gefahr ist, was gerade in der Forschung passiert – und wie sich das auf die Zukunft von Kryptografie und Bitcoin auswirken könnte.Von und mit: [[Chris]]Produziert und geschnitten: ChrisHier könnt ihr uns eine Spende über Lightning da lassen: ⚡️nodesignal@getalby.comWenn euch unsere Arbeit gefällt, könnt ihr unsere Folgen auch auf Podcasting 2.0 Plattformen, wie Fountain, PodcastGuru, Castamatic, Breez oder Podverse hören und uns so eine kleine Aufmerksamkeit da lassen. Danke an alle, die die Bitcoin Community mit ihren Spenden unterstützen! Mit diesen Spenden wird unter anderem unser Bounty Programm verwirklicht, in dem ihr euch für die Mitarbeit an einem Projekt eine Belohnung sichern könnt.Für Feedback und weitergehenden Diskussionen kommt gerne in die Telegramgruppe von Nodesignal und bewertet uns bei Spotify und Apple Podcasts. Folgt uns auch gerne bei Nostr:npub1n0devk3h2l3rx6vmt24a3lz4hsxp7j8rn3x44jkx6daj7j8jzc0q2u02cy und Twitter.Blockzeit: 892982https://tuta.com/dehttps://tuta.com/de/blog/world-quantum-dayMusik: Final Girl von Jeremy Blake (royalty free) Timestamps:(00:00) Intro(00:22) Intro PQC Serie(04:12) Vorestellung Hanna(07:30) Was ist Kryptografie?(11:57) Was sind Quanten-Computer?(16:32) Was ist Post-Quanten-Kryptografie?(18:56) Gibt es PQC Standards?(21:26) Welche Rolle spielt das NIST?(24:44) Worauf basiert PQC?(25:45) Was sind die Nachteile von PQC?(29:11) Warum jetzt schon PQC?(34:58) Was kommt bei Tuta im Hinblick auf PQC?(36:48) Ein Cheat Sheet für die Hörer(38:44) 2 Zusatzfragen(41:20) Verabschiedung(45:37) Focus on the Signal

Cybercrime Magazine Podcast
Quantum Minute. Post-Quantum Encryption: NIST Picks HQC. Sponsored by Applied Quantum.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 17, 2025 1:57


The U.S. National Institute of Standards and Technology (NIST) has selected the Hamming Quasi-Cyclic (HQC) algorithm as a backup post-quantum encryption standard, adding a fifth quantum-resistant tool to its lineup of post quantum cryptography (PQC) standards. Unlike the primary standard ML-KEM – which is based on a complex type of multi-dimensional modelling called lattice mathematics – HQC uses code-based cryptography, offering an alternative defense in case future quantum breakthroughs threaten the integrity of lattice-based systems. HQC emerged from NIST's fourth round of evaluation, where it outperformed similar candidates like BIKE and Classic McEliece due to its strong security and practical performance. You can listen to all of the Quantum Minute episodes at QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

Root Causes: A PKI and Security Podcast
Root Causes 487: Security 2030

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Apr 16, 2025 46:40


Jason and I take a peek forward at what we imagine IT security looks like in 2030. Topics include PQC, ZTNA, "green zones," deep fakes, IoT, connected cars, agentic AI, blockchain, and CLM.

Bit-Rauschen: Der Prozessor-Podcast von c’t
Quantencomputer machen Fortschritte | Bit-Rauschen 2025/8

Bit-Rauschen: Der Prozessor-Podcast von c’t

Play Episode Listen Later Apr 9, 2025 64:11


Quantenrechner entwickeln sich rasant weiter, aber viele Erfolgsmeldungen verwirren. Licht ins Dunkel bringt der Podcast Bit-Rauschen, Folge 2025/8.

Root Causes: A PKI and Security Podcast
Root Causes 483: Introducing the PQC Sandbox

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Apr 7, 2025 22:40


We are joined by repeat guest Bruno Coulliard of Crypto4A to introduce Sectigo's new post quantum cryptography (PQC) sandbox. The PQC sandbox allows you to get quantum resistant certificates in your hands to understand how they work with your systems.

Root Causes: A PKI and Security Podcast
Root Causes 482: Microsoft and PQC

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Apr 2, 2025 14:38


In this episode we explore the potential PQC future for Microsoft Active Directory Certificate Services, aka MSCA. We discuss potential paths for Microsoft to take and their consequences.

The Cybersecurity Readiness Podcast Series
Future-Proofing Your Data: Preparing for the Post-Quantum Era

The Cybersecurity Readiness Podcast Series

Play Episode Listen Later Mar 31, 2025 34:40


Dr. Dave Chatterjee and David Close discuss the implications of post-quantum cryptography (PQC) on cybersecurity readiness. David, a Chief Solutions Architect at Futurex, explains the evolution of cryptographic methods to counter quantum computing threats. He highlights the importance of NIST's role in standardizing quantum-resistant algorithms like Kyber and Dilithium. David shares practical examples, such as Google and Cloudflare's hybrid TLS implementation and a financial institution's use of PQC for data storage. They emphasize the need for organizations to develop roadmaps, inventory cryptographic assets, and ensure vendor readiness. Dr. Chatterjee stresses the importance of a proactive, holistic approach to cybersecurity governance.To access and download the entire podcast summary with discussion highlights -- https://www.dchatte.com/episode-83-future-proofing-your-data-preparing-for-the-post-quantum-era/Latest Articles and Press Releases on The Cybersecurity Readiness Podcast Series:Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness, Yahoo!Finance, Dec 16, 2024Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness, Marketers Media, Dec 12, 2024.Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally, Business Insider/Markets Insider, Dec 10, 2024.Connect with Host Dr. Dave Chatterjee and Subscribe to the PodcastPlease subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712Latest Publications & Press Releases:“Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity,” Chicago Tribune, February 24, 2025.“Dr. Dave Chatterjee...

The Post-Quantum World
PQC-Powered Corporate Messaging – with Anurag Lal of NetSfere

The Post-Quantum World

Play Episode Listen Later Mar 19, 2025 35:25


Migrating to post-quantum cryptography across an organization will take time. But while you are replacing every cipher to defend against the threat side of quantum computing, you may also want to add systems that bring new functionality and come with PQC out of the gate. Imagine a mobile messaging app like WhatsApp, but with NIST-approved ML-KEM under the hood and enterprise-grade controls. From hospitals dodging ransomware to finance professionals sharing secrets in quantum-proof chats, customers are already using this tool. Join host Konstantinos Karagiannis for a chat with Anurag Lal from NetSfere.  For more information on NetSfere, visit www.netsfere.com/.  Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech.         Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

Impact Quantum: A Podcast for Engineers
The Urgency of Quantum Security: Is Your Data Truly Safe?

Impact Quantum: A Podcast for Engineers

Play Episode Listen Later Mar 17, 2025 58:07


In our latest podcast episode, hosts Candace Gillhoolley, Frank La Vigne, along with Andy Schwaderer from Quantum Knight, dive into the critical need for upgrading security systems today to outpace tomorrow's quantum-powered threats. Key highlights include:Post-Quantum Cryptography: Andy Schwaderer explains the nuances of post-quantum cryptography, detailing how it updates current encryption techniques like RSA and AES to resist the immense computational power of emerging quantum computers. This is essential to protect against impending threats where quantum machines could rapidly crack today's encryption methods.The Looming Threat: The conversation also touches on "harvest now, decrypt later" risks, emphasizing how adversaries might hoard encrypted data today, intending to decrypt it once quantum computers become mainstream.Real-World Implications: Imagine critical infrastructure being tampered with or AI models poisoned with inaccurate data — scenarios that Quantum Knight's solutions aim to prevent.Making Security Accessible: Perhaps the most exciting takeaway from Quantum Knight's approach is how they make cryptographic security across various platforms not just robust but also accessible and easy to implement.This episode serves as a wake-up call to the very real security challenges of a quantum future and underscores the urgent need to act now to protect our data integrity and privacy.Quantum Moments00:00 "Quantum Computing Threatens Current Cryptography"04:14 Quantum Computing: Cybersecurity's New Threat08:33 Quantum Threats to Data Security11:40 Preparing for Quantum Data Threats15:53 Post-Quantum Cryptography Insights17:40 Quantum Machines: The Current Challenge23:00 Data Integrity and Authentication Breakthrough24:26 Medical Device Hacking Risks28:56 Verifying Human Identity Over AI33:27 PQC's Broad Impact and Challenges35:58 Simple Software SDK Solution40:08 Convincing C-Suite on Cybersecurity42:55 CISO/CIO Turnover Post-Breach Trend44:25 Bank Fines Highlight Regulatory Challenges47:30 Shift Focus from AI to Security52:38 AI Adoption and Market Reality55:41 Simplifying User Experience for Virality57:13 "Quantum Security Crisis Solutions"

Ciena Network Insights
Episode 84: Part 2- Quantum secure communications: Quantum Key Distribution and Post-Quantum Cryptography

Ciena Network Insights

Play Episode Listen Later Mar 5, 2025 21:05


In part two of this episode, Paulina Gomez, Ryan Lafler, Doug Schremp, and Paola Osorio delve into Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC) algorithms. They discuss the principles of QKD, its challenges, and industry progress, as well as the development of PQC algorithms to deliver quantum-resistant encryption solutions. They also explore future milestones and the solutions that are available today to safeguard critical data and mitigate the quantum computing threat to enable quantum-secure communications.

Telecom Reseller
Graphiant's Vision: Transforming Telcos into Data Companies, Podcast

Telecom Reseller

Play Episode Listen Later Mar 3, 2025


"The internet is changing—it's no longer just about content. It must evolve into a data exchange fabric," says Khalid Raza, CEO & Founder, Graphiant. In this Technology Reseller News Podcast, Khalid, joins Doug Green to discuss Graphiant's new Data Assurance Service, the future of telcos, and how AI-driven networking will redefine the internet. Graphiant's Mission: The Internet for AI, Not Just Content From Content Delivery to Data Exchange – The internet was built for content distribution, but AI and cloud computing require seamless data exchange between enterprises, partners, and applications. The Future is Programmable Networking – Graphiant envisions a cloud-based service plane, decoupled from hardware, enabling real-time visibility, security, and automation. New Data Assurance Service: Protecting Data in Motion Graphiant's Data Assurance Service ensures data security, regulatory compliance, and real-time visibility as data moves across global networks. Path Control – Companies can restrict data routes, avoiding certain countries or network vendors due to security or compliance concerns. Real-Time Threat Detection – Graphiant monitors and stops breaches in seconds by analyzing egress traffic and suspicious IP destinations. Security-Driven Routing – “Rather than routing driving security, security should drive routing.” A Message to Telcos: Stop Being Just a Transport Provider From Telco to TechCo – Service providers must move beyond just selling connectivity and become data intelligence companies. Software-Defined Networking – Traditional networking vendors tie services to hardware, but Graphiant enables cloud-based, software-defined services that can be updated instantly. B2B Data Exchange is the Next Frontier – AI-driven businesses need fast, secure, and intelligent data sharing between partners. Telcos can own this opportunity. Upcoming Graphiant Innovations: AI & Post-Quantum Security Agentic AI & Distributed Data Access – AI models require real-time access to distributed data sources. Networking must keep up with AI's exponential data needs. Post-Quantum Cryptography (PQC) – Graphiant will launch PQC capabilities in 2024, ensuring future-proof encryption against quantum computing threats. Where to Learn More Graphiant Website: www.graphiant.com Follow Graphiant on LinkedIn for updates on their B2B launch in March. #AI #DataSecurity #Networking #TelecomTransformation #CloudComputing #DataExchange #TechInnovation #Graphiant

Root Causes: A PKI and Security Podcast
Root Causes 474: Explaining Shor's Algorithm

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Mar 2, 2025 21:12


We talk a lot about Shor's Algorithm in our discussion of post quantum cryptography (PQC). In this episode Jason explains Shor's algorithm for non-quantum physicists.

Root Causes: A PKI and Security Podcast
Root Causes 471: ACME for PQC

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Feb 23, 2025 21:28


In this episode, guest Alexandre Giron explains what is needed to support post quantum cryptography (PQC) with ACME.

The Post-Quantum World
PQC Survey Says … What 4,000 Professionals Are Doing About It — with Samantha Mabey of Entrust

The Post-Quantum World

Play Episode Listen Later Feb 5, 2025 36:40


I'm always asked the same question when talking to customers about the threats of quantum computing and the move to post-quantum cryptography. What are similar companies doing about it? It's only been half a year since the NIST standards were published, but we're starting to see some traction. Join host Konstantinos Karagiannis for a chat with Samantha Mabey from Entrust about an interesting study on migration, along with some tactical advice for getting your PQC journey underway. For more information on Entrust, visit www.entrust.com/.  Read the PKI and PQ study here:  www.entrust.com/cybersecurity-institute/reports/2024-pki-and-post-quantum-trends-study.  Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech.     Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

Root Causes: A PKI and Security Podcast
Root Causes 464: Defending Against Harvest and Decrypt

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Feb 5, 2025 9:49


Harvest and decrypt is a well-known attack vector against traditional cryptography prior to PQC. In this episode, we discuss what enterprises should be doing today to defend themselves against harvest and decrypt.

Dave and Dharm DeMystify
EP 121: DEMYSTIFYING QUANTUM IN 2025 AND QUANTUM INDEX WITH STEVE SUAREZ

Dave and Dharm DeMystify

Play Episode Listen Later Feb 4, 2025 30:07


Welcome to the latest episode of the Dave and Dharm Demystified Podcast, where we dive deep into the world of innovation and emerging technologies. Today, we're thrilled to be joined by Steve Suarez, CEO of Horizon X and former Head of Innovation at HSBC, who is helping shape the future of quantum computing in financial services. Steve brings unparalleled insight into the transformative power of quantum, sharing his work on cutting-edge initiatives like The Quantum Innovation Index, which ranks industries and institutions on their quantum readiness, and his collaboration with MIT on accessible quantum courses for business leaders. In this episode, we'll explore: > Why 2025 is a pivotal year for quantum preparation. >The urgency of post-quantum cryptography (PQC) and how to safeguard against Q-Day. > How the newly launched Quantum Innovation Index can help industries benchmark their progress in adopting this game-changing technology. >The practical steps financial institutions can take today to stay ahead in the quantum race, such as getting educated about the subject! Steve's passion for quantum isn't just about the technology—it's about building a bridge between quantum's potential and real-world applications. Whether you're a fintech innovator or a banking executive, this episode will leave you with actionable insights on preparing for the quantum revolution. So, sit back and join us as we demystify quantum computing with one of the leading voices in the field. Let's dive in! Quantum Innovation Index: https://thequantumindex.com/ MIT XPro: https://learn-xpro.mit.edu/horizonx

Root Causes: A PKI and Security Podcast
Root Causes 460: The State of PQC with Michele Mosca

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Jan 28, 2025 31:48


In this episode we are joined by Dr. Michela Mosca. We discuss his pioneering work identifying the need for post-quantum cryptography, where PQC stands today, and what the future may hold.

The Post-Quantum World
Here Comes the Helios – 50 Logical Qubits, All Right – with Rajeeb Hazra of Quantinuum

The Post-Quantum World

Play Episode Listen Later Jan 22, 2025 36:45


Many companies call 2025 the year of quantum computing for reasons ranging from PQC to better applications and hardware. Here comes the Helios system from Quantinuum, and we say it's all right to celebrate 50 logical qubits this year. We look at the company's roadmap, aggressive error-correction ratios, and some innovative ways the coming systems will work with AI to solve problems and not just generate hype. Join host Konstantinos Karagiannis for a chat with CEO Rajeeb Hazra from Quantinuum.  For more information on Quantinuum, visit www.quantinuum.com/.  Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech.   Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

Root Causes: A PKI and Security Podcast
Root Causes 455: PQC Standardization in IETF

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Jan 8, 2025 35:54


We talk with guest Sofia Celi of Brave Browser, who leads the IETF PQC standardization effort, about the process of setting standards for PQC-compatible digital certificates. We learn about expected timelines, hybrid strategies, the NIST PQC onramp's role, and more.

Root Causes: A PKI and Security Podcast
Root Causes 454: 2024 Lookback - Post quantum cryptography (PQC)

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Jan 2, 2025 7:45


2024 was an eventful year for post quantum cryptography (PQC). This includes FIPS standards, the PQC onramp, and the dawn of widespread interest among IT professionals.

Root Causes: A PKI and Security Podcast
Root Causes 450: 2025 Predictions

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Dec 23, 2024 48:29


We make our 2025 predictions. Topics include maximum certificate term, AI, post-quantum cryptography (PQC), deep fakes, and more.

Root Causes: A PKI and Security Podcast
Root Causes 449: What Is a Quantum-safe HSM?

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Dec 18, 2024 23:48


Repeat guest Bruno Coulliard of Crypto4A joins us to define a quantum-safe (or PQC enabled) hardware security module.

Root Causes: A PKI and Security Podcast
Root Causes 447: NIST Deprecates RSA-2048 and ECC 256

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Dec 13, 2024 13:46


As part of its post-quantum cryptography (PQC) initiative NIST has released a draft deprecating RSA-2048 and ECC 256 by 2030 and disallowing them by 2035. We get into the details.

The Cybersecurity Institute Podcast, by Entrust
The year ahead in cyber – AI, Quantum Computing, Identity, and so much more

The Cybersecurity Institute Podcast, by Entrust

Play Episode Listen Later Dec 12, 2024 39:10


Among many other milestones, 2024 was the year generative AI went mainstream, identity fraud went digital first, and the first post quantum cryptography (PQC) standards were issued by NIST. As we look ahead to 2025, which cyber trends will gain momentum? And which will fall to the wayside? In this podcast, we'll delve into our top cyber predictions for 2025 including the possible evolution of AI, quantum computing, digital identity, and regulation.

Root Causes: A PKI and Security Podcast
Root Causes 444: What Happens to the WebPKI if Google Sells Chrome?

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Dec 5, 2024 19:25


We discuss how a potential break of Chrome from Google would affect the WebPKI. We look at product changes, resourcing, post-quantum cryptography (PQC), innovation, moonshot initiatives, and other public CAs.

Root Causes: A PKI and Security Podcast
Root Causes 439: PQC Onramp Narrowed Down to 15 Candidates

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Nov 15, 2024 17:13


NIST has narrowed its PQC onramp contest to 15 candidates. We go over who remains and the makeup of the remaining candidates.

Root Causes: A PKI and Security Podcast
Root Causes 438: PQC Is an Existential Requirement

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Nov 12, 2024 28:19


Repeat guest Bruno Couillard argues that cryptography is part of the foundational fabric of our lives and that the transition to PQC is an existential requirement.

Root Causes: A PKI and Security Podcast
Root Causes 435: The PQC "Q Day" Is Not That Simple

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Oct 25, 2024 19:45


The PQC community likes to debate when crypto relevant quantum computers will be available, which is sometimes called "Q day." In this episode we explain how radically oversimplified this concept is and dive into the nuances of what a "cryptographically relevant quantum computer" really will be.

The Daily Decrypt - Cyber News and Discussions
RSA Encryption Cracked using Quantum in China, Clorox Behind on Plastic Reduction

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Oct 15, 2024


Video Episode: https://youtu.be/yyl2icu6o3I In today’s episode, we discuss groundbreaking research from Chinese scientists who demonstrated that D-Wave's quantum computers can break RSA encryption and threaten widely used cryptographic methods, emphasizing the urgency for quantum-safe solutions. We also cover the aftermath of a significant cyberattack on Clorox, which has impacted its sustainability goals, and analyze a report from Checkmarx detailing “command jacking” vulnerabilities in open source packages, highlighting the need for robust security measures in software development. Join us as we unpack these critical cybersecurity developments and their implications for businesses and the future of data protection. Source articles: 1. https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html 2. https://www.cybersecuritydive.com/news/clorox-cyberattack-waste-reduction-goals/729642/ 3. https://www.csoonline.com/article/3560931/open-source-package-entry-points-could-be-used-for-command-jacking-report.html Timestamps 00:00 – Introduction 00:57 – Quantum Cracks RSA 02:26 – Clorox behind on plastic reduction 04:41 – Command Jacking in OSS 1. What are today’s top cybersecurity news stories? 2. How are quantum computers threatening RSA encryption? 3. What impact did Clorox's 2023 cyberattack have on its sustainability goals? 4. What is command jacking in open source software? 5. How can D-Wave’s quantum computers break cryptographic systems? 6. What are the implications of quantum computing for data security? 7. How did Clorox recover from its major cyberattack? 8. What vulnerabilities exist in open source package managers? 9. Why is post-quantum cryptography important for cybersecurity? 10. What strategies can developers implement to safeguard against package entry point vulnerabilities? D-Wave, quantum computing, RSA encryption, cryptographic solutions, Clorox, cyberattack, sustainability, plastic waste, Checkmarx, command jacking, malicious code, security checks, 1. **RSA Encryption** – *Definition*: A widely used public-key cryptographic system that relies on the computational difficulty of factoring large integers, ensuring secure data transmission. – *Importance*: RSA is foundational to numerous secure communications over the internet, and its potential vulnerability to quantum attacks could compromise global data integrity and confidentiality. 2. **Quantum Computer** – *Definition*: A type of computer that uses quantum bits (qubits) and principles of quantum mechanics, enabling it to process complex computations significantly faster than classical computers. – *Importance*: Quantum computers, by their nature, pose significant threats to classical cryptographic systems due to their ability to solve problems deemed infeasible for traditional computers, such as factoring large numbers. 3. **D-Wave** – *Definition*: A company specializing in the development of quantum computing systems, particularly known for its quantum annealing technology. – *Importance*: D-Wave’s systems are central to the study showcasing quantum capabilities to break traditional encryption, illustrating the practical advancements in quantum technologies. 4. **Quantum Annealing** – *Definition*: A quantum computing technique used to find the global minimum of a given objective function over a set of candidate solutions, particularly useful in optimization problems. – *Importance*: This technique has been demonstrated to potentially break encryption by optimizing and solving cryptographic problems more efficiently than classical methods. 5. **Substitution-Permutation Network (SPN)** – *Definition*: A method used in the design of block ciphers, which is based on a series of linked mathematical operations involving substitution and permutation. – *Importance*: SPN forms the basis for various encryption algorithms, and compromising it indicates vulnerabilities in widely used cryptographic systems. 6. **Advanced Encryption Standard (AES)** – *Definition*: A symmetric encryption algorithm adopted as the standard for encrypting data by the U.S. government, based on the Rijndael cipher. – *Importance*: AES is critical for securing sensitive information worldwide, and any threat to its integrity threatens global cybersecurity structures. 7. **Post-Quantum Cryptography (PQC)** – *Definition*: A branch of cryptography focused on developing algorithms resistant to attacks from quantum computers. – *Importance*: With quantum computing emerging as a threat to current cryptographic systems, PQC aims to secure communications in a quantum-capable future. 8. **Public-Key Cryptography** – *Definition*: A cryptographic system that uses pairs of keys: public keys that may be disseminated widely, and private keys which are known only to the owner. – *Importance*: It is pivotal for numerous secure transactions and encrypted communications on the internet, underpinning the security of data exchanges. 9. **Encryption** – *Definition*: The process of encoding information in such a way that only authorized parties can access it, rendering the data unreadable to unauthorized users. – *Importance*: It is essential for protecting sensitive information across all forms of digital communication against unauthorized access and data breaches. 10. **Quantum-Safe Encryption** – *Definition*: Encryption methods that are secure against decryption by quantum computers, typically developed as part of post-quantum cryptographic efforts. – *Importance*: As quantum computing progresses, developing quantum-safe methods is crucial to maintain the security of data and communications against future quantum threats.

Root Causes: A PKI and Security Podcast
Root Causes 430: How Does a TLS Handshake Work?

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Oct 9, 2024 14:31


In this episode we give a high-level explanation of what happens in a TLS 1.3 handshake and then discuss what will happen when PQC is included.

The Post-Quantum World
Securing Systems with Blockchain and Post-Quantum Cryptography — with David Carvalho and David Holtzman of Naoris Protocol

The Post-Quantum World

Play Episode Listen Later Sep 18, 2024 42:46


Imagine a mesh network of AI-powered nodes that could validate the security of your organization's systems and applications. It's a clever use of blockchain to add security to real-world devices, and, best of all, it will feature post-quantum cryptography. How soon will this technology simplify security for businesses and governments worldwide? And might this kind of approach even prevent killer robots? Join host Konstantinos Karagiannis for a chat with David Carvalho and David Holtzman from Naoris Protocol.  For more on Naoris Protocol, visit www.naorisprotocol.com/.  Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech.  Questions and comments are welcome!   Theme song by David Schwartz, copyright 2021.   The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Compromise of old hostname .mobi whois server https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/ Microsoft Reconsidering Security Tool API https://blogs.windows.com/windowsexperience/2024/09/12/taking-steps-that-drive-resiliency-and-security-for-windows-customers/ Microsoft implents PQC in SymCrypt https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-s-quantum-resistant-cryptography-is-here/ba-p/4238780 GitLab Patch https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/#execute-environment-stop-actions-as-the-owner-of-the-stop-action-job

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Compromise of old hostname .mobi whois server https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/ Microsoft Reconsidering Security Tool API https://blogs.windows.com/windowsexperience/2024/09/12/taking-steps-that-drive-resiliency-and-security-for-windows-customers/ Microsoft implents PQC in SymCrypt https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-s-quantum-resistant-cryptography-is-here/ba-p/4238780 GitLab Patch https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/#execute-environment-stop-actions-as-the-owner-of-the-stop-action-job

The CyberWire
A Patch Tuesday overload.

The CyberWire

Play Episode Listen Later Sep 11, 2024 28:45


Patch Tuesday rundown. Microsoft integrates post-quantum cryptography (PQC) algorithms into its SymCrypt cryptographic library.The FTC finalizes rules to combat fake reviews and testimonials. A payment card thief pleads guilty. On our latest CertByte segment, N2K's Chris Hare and George Monsalvatge share questions and study tips from the Microsoft Azure Fundamentals (AZ-900) Practice Test.  Hard Drive Heaven: How Iconic Music Sessions Are Disappearing.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's Microsoft Azure Fundamentals (AZ-900) Practice Test. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. Reference: What is public cloud? (RedHat) Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Remembering 9/11 In today's episode, we pause to honor and remember the lives lost on September 11, 2001. We pay tribute to the courageous first responders, the resilient survivors, and the families whose lives were forever altered by that tragic day. Amidst the profound loss, the spirit of unity and compassion shone brightly, reminding us of our shared humanity. Additionally, you can check out our special segment featuring personal remembrances from N2K CyberWire's very own Rick Howard, who was in the Pentagon on that fateful day. His reflections provide a heartfelt perspective on the events and are well worth your time. Tune in to hear his poignant insights. Special Edition Podcast In today's special edition of Solution Spotlight, we welcome Mary Haigh, Global CISO of BAE Systems, as she sits down with N2K's Simone Petrella. Together, they discuss moving beyond the technical aspects of cybersecurity to build and lead a high-performing security team. Selected Reading Microsoft Fixes Four Actively Exploited Zero-Days (Infosecurity Magazine) Adobe releases september 2024 patches for flaws in multiple products, including critical (Beyond Machines) Chrome 128 Update Resolves High-Severity Vulnerabilities (SecurityWeek) ICS Patch Tuesday: Advisories Published by Siemens, Schneider, ABB, CISA (SecurityWeek) Ivanti fixes maximum severity RCE bug in Endpoint Management software (Bleeping Computer) Microsoft Adds Support for Post-Quantum Algorithms in SymCrypt Library (SecurityWeek) Federal Trade Commission Announces Final Rule Banning Fake Reviews and Testimonials (Federal Trade Commission) Hacker pleads guilty after arriving on plane from Ukraine with a laptop crammed full of stolen credit card details (Bitdefender) Inside Iron Mountain: It's Time to Talk About Hard Drives (Mixonline) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach top security leaders. Explore our network sponsorship opportunities and build your brand where industry leaders get their daily news. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Soul Bela
EP 76 | PQC Pergunte me qualquer coisa (PARTE 2)

Soul Bela

Play Episode Listen Later Aug 30, 2024 60:11


Respondendo dúvidas. Esse episódio será num formato pergunta e resposta, o que vou batizar de PQC, pergunte-me qualquer coisa.   Hoje vou falar de exercícios, como programar para não se machucar ou para favorecer a recuperação.  Minha opinião sobre coca zero e afins, falarei de novo de doce de leite, de quantidade de whey, de hitt, responderei ainda outras coisas sobre jejum, sobre janela pós e sobre picos de cortisol e exercícios. Responderei duvidas especificas de horários de pré treino em casos específicos. Enfim, de novo um mix de perguntas diversas que ainda surgiram e que acho que se ainda estão perguntando é porque eu não fui tão clara quanto gostaria. Eu realmente quero que vocês entendam o raciocínio, porque a vida acontece e eu quero que você consiga poder pensar sozinha no que será melhor para você.  Site do podcast https://isabelafortes.com.br/  instagram https://www.instagram.com/fortes_isabela/  Suplementos proteínas que eu recomendo nos EUA FULLSCRIPT COM DESCONTO DE 10% AUTOMATICAMENTE APLICADO https://us.fullscript.com/plans/ifortes-proteinas-proteins  NA AMAZON https://www.amazon.com/shop/fortes_isabela/list/13XWTA71MS4LB?ref_=cm_sw_r_cp_ud_aipsflist_aipsffortes_isabela_HFBC69CHYHTNMD2D3D9W  Suplementos de proteínas que eu recomendo no Brasil FARMACIA FORMULA Pedir por telefone ou whatsapp o Whey Fortes na farmacia Formula +55 51 99107-2838 Use cupom: ISABELA10 para desconto de 10% PARA OS VEGETARIANOS  Super coffee, proteína vegetal, leite de castanha https://www.mahta.bio/isabelafortes  Cupom ISABELAFORTES será aplicado imediatamente na sua primeira compra. ESSENTIAL NUTRITION https://www.essentialnutrition.com.br/catalogsearch/result/?q=%22proteina%22 Os clientes da Isabela tem desconto especial na Essential, entre em contato diretamente com a Isabela para obter o seu. Outros episódios relacionados com esse tema:  EP 12 | Armadura Corporal: Proteína para construção de massa muscular e perda de peso | Isabela Fortes  EP 61 | Potpourris: Tirando dúvidas | Isabela Fortes  EP 74 | Pré e Pós Treino: O que consumir antes e depois dos exercícios | Isabela Fortes  EP 73 | Tudo sobre Proteínas em pó, Whey e Colágeno | Isabela Fortes Produção: Wepod

The CyberWire
Mic, camera, and more at risk.

The CyberWire

Play Episode Listen Later Aug 19, 2024 30:20


Cisco Talos discovers vulnerabilities in Microsoft applications for macOS. OpenAI disrupts an Iranian influence campaign. Jewish Home Lifecare discloses a data breach affecting over 100,000. Google tests an auto-redaction feature in Chrome for Android. Unicoin informs the SEC that it was locked out of G-Suite for four days. House lawmakers raise concerns over China-made WiFi routers. Moody's likens the switch to post-quantum cryptography to the Y2K bug. Diversity focused tech nonprofits grapple with flagging support. Tim Starks of CyberScoop is back to discuss his investigation of a Russian hacking group targeting human rights groups. Smart phones get some street smarts. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We welcome Tim Starks of CyberScoop back to discuss his story "Russian hacking campaign targets rights groups, media, former US ambassador." Selected Reading Vulnerabilities in Microsoft's macOS apps could help hackers access microphones and cameras (The Record) OpenAI Disrupts Iranian Misinformation Campaign (The New York Times) 100,000 Impacted by Jewish Home Lifecare Data Breach (SecurityWeek) Chrome will redact credit cards, passwords when you share Android screen (Bleeping Computer) Crypto firm says hacker locked all employees out of Google products for four days (The Record) House lawmakers push Commerce Department to probe Chinese Wi-Fi router company (CyberScoop) Moody's sounds alarm on quantum computing risk, as transition to PQC ‘will be long and costly' (Industrial Cyber) The movement to diversify Silicon Valley is crumbling amid attacks on DEI (Washington Post) Google's Stunning New Android AI Feature Instantly Locks Phone Thieves Out (Forbes) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices