POPULARITY
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional firewalls. From cutting-edge innovations to expert insights, discover what security leaders should prioritize to stay ahead of evolving threats. This segment is sponsored by Zero Networks. Visit https://securityweekly.com/zerorsac to learn more about them! In this segment, Keyfactor CSO Chris Hickman takes stock of industry progress towards quantum-resistant cryptography. Using recent guidance from NIST and his company's data on which certificates and keys pose the largest threats to organization now, Chris unpacks what it means to be risk intelligent and quantum safe. Segment Resources: • Command Risk Intelligence press release: https://www.keyfactor.com/press-releases/keyfactor-unveils-worlds-first-certificate-risk-management-solution/ • Recent blog post on the transition to PQC: https://www.keyfactor.com/blog/getting-quantum-ready-why-2030-matters-for-post-quantum-cryptography/ To learn more about the road to being quantum ready, stop by Keyfactor's booth at the conference, number #748, or visit: https://securityweekly.com/keyfactorrsac As cyber threats become increasingly difficult to detect and the technology to combat them continues to evolve, organizations must be prepared to move faster than ever. Looking ahead, the rise of post-quantum computing will bring both new opportunities and challenges, further reshaping the cybersecurity landscape. With the launch of Entrust's Cryptographic Security Platform (announcement coming April 16th) as a backdrop, Jordan can discuss why all organizations – large and small – must prioritize post-quantum preparedness before it's too late. He can also address emerging fraud technologies (e.g., deepfakes, GenAI) and fraud attacks (account takeovers, synthetic identities, impersonation), which are drawing more attention to the need for cyber-resilient methods, such as post-quantum cryptography, to protect against new fraud risks in the digital future. This segment is sponsored by Entrust. Visit https://securityweekly.com/entrustrsac to learn more about them! As quantum computing advances, the security foundations of our digital world face unprecedented challenges. This session explores how integrating Public Key Infrastructure (PKI) and Domain Name System (DNS) technologies can fortify digital trust in the quantum era. We'll delve into strategies for transitioning to post-quantum cryptography, ensuring interoperability, and maintaining the integrity of digital communications. Join us to understand the roadmap for achieving quantum resilience and safeguarding the future of digital trust. Segment Resources: https://www.digicert.com/what-is-pki https://www.digicert.com/faq/dns https://www.digicert.com/faq/dns/what-is-dns https://www.linkedin.com/posts/amitsinhadigitaltrust-trustsummit-pki-activity-7315749270505037824-lUBf?utmsource=share&utmmedium=memberdesktop&rcm=ACoAAAC22mYBCeB_s0YvGTVQsGiChh7wRXa4jRg https://www.digicert.com/blog/compliance-the-foundation-of-digital-trust https://www.digicert.com/blog/digital-trust-as-an-it-imperative This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-397
The UK National Cyber Security Centre (NCSC) has released new PQC guidance. We take exception to the dates it gives and explain why.
Guest Sofia Celi (IETF, Brave) returns to talk about important developments in post quantum cryptography. Sofia tells us about her candidate algorithm MAYO and what is happening with the NIST PQC onramp. We learn about KEM TLS and the status of PQC initiatives in IETF.
We build on our Trust Models discussion to explore how organizations can structure their PKI for the transition to post quantum cryptography (PQC).
The UK's National Cyber Security Centre (NCSC) has provided formal guidance to system and risk owners in various industry sectors about how to prepare for the migration to post-quantum cryptography. While symmetric cryptography is not significantly impacted by quantum technology, the NCSC said PQC will eventually replace vulnerable PKC algorithms, providing secure alternatives for key establishment and digital signatures. System owners are advised to start planning for integration of PQC into their infrastructure, with the migration likely happening seamlessly through software updates for commodity IT – but requiring more effort for bespoke or enterprise IT systems. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.
In this podcast, we'll delve into the key cybersecurity challenges associated with the arrival of Q-Day, what is needed to attain and maintain a Zero Trust strategy in the post quantum era and offer practical guidance on how to facilitate the cryptographic transition to post quantum cryptography (PQC).
In der heutigen Folge spricht Chris mit Hanna von Tuta über die Notwendigkeit, sich jetzt schon Gedanken über Post-Quantum-Cryptography zu machen. Mit dieser Folge starten wir eine kleine Serie zum Thema Post-Quanten-Kryptografie. Der Grund: Quantencomputer entwickeln sich rasant weiter und könnten schon bald klassische Verschlüsselung bedrohen – mit möglichen Folgen für unsere gesamte digitale Infrastruktur, inklusive Bitcoin. In dieser Reihe schauen wir uns an, wie real die Gefahr ist, was gerade in der Forschung passiert – und wie sich das auf die Zukunft von Kryptografie und Bitcoin auswirken könnte.Von und mit: [[Chris]]Produziert und geschnitten: ChrisHier könnt ihr uns eine Spende über Lightning da lassen: ⚡️nodesignal@getalby.comWenn euch unsere Arbeit gefällt, könnt ihr unsere Folgen auch auf Podcasting 2.0 Plattformen, wie Fountain, PodcastGuru, Castamatic, Breez oder Podverse hören und uns so eine kleine Aufmerksamkeit da lassen. Danke an alle, die die Bitcoin Community mit ihren Spenden unterstützen! Mit diesen Spenden wird unter anderem unser Bounty Programm verwirklicht, in dem ihr euch für die Mitarbeit an einem Projekt eine Belohnung sichern könnt.Für Feedback und weitergehenden Diskussionen kommt gerne in die Telegramgruppe von Nodesignal und bewertet uns bei Spotify und Apple Podcasts. Folgt uns auch gerne bei Nostr:npub1n0devk3h2l3rx6vmt24a3lz4hsxp7j8rn3x44jkx6daj7j8jzc0q2u02cy und Twitter.Blockzeit: 892982https://tuta.com/dehttps://tuta.com/de/blog/world-quantum-dayMusik: Final Girl von Jeremy Blake (royalty free) Timestamps:(00:00) Intro(00:22) Intro PQC Serie(04:12) Vorestellung Hanna(07:30) Was ist Kryptografie?(11:57) Was sind Quanten-Computer?(16:32) Was ist Post-Quanten-Kryptografie?(18:56) Gibt es PQC Standards?(21:26) Welche Rolle spielt das NIST?(24:44) Worauf basiert PQC?(25:45) Was sind die Nachteile von PQC?(29:11) Warum jetzt schon PQC?(34:58) Was kommt bei Tuta im Hinblick auf PQC?(36:48) Ein Cheat Sheet für die Hörer(38:44) 2 Zusatzfragen(41:20) Verabschiedung(45:37) Focus on the Signal
The U.S. National Institute of Standards and Technology (NIST) has selected the Hamming Quasi-Cyclic (HQC) algorithm as a backup post-quantum encryption standard, adding a fifth quantum-resistant tool to its lineup of post quantum cryptography (PQC) standards. Unlike the primary standard ML-KEM – which is based on a complex type of multi-dimensional modelling called lattice mathematics – HQC uses code-based cryptography, offering an alternative defense in case future quantum breakthroughs threaten the integrity of lattice-based systems. HQC emerged from NIST's fourth round of evaluation, where it outperformed similar candidates like BIKE and Classic McEliece due to its strong security and practical performance. You can listen to all of the Quantum Minute episodes at QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.
Jason and I take a peek forward at what we imagine IT security looks like in 2030. Topics include PQC, ZTNA, "green zones," deep fakes, IoT, connected cars, agentic AI, blockchain, and CLM.
Quantenrechner entwickeln sich rasant weiter, aber viele Erfolgsmeldungen verwirren. Licht ins Dunkel bringt der Podcast Bit-Rauschen, Folge 2025/8.
We are joined by repeat guest Bruno Coulliard of Crypto4A to introduce Sectigo's new post quantum cryptography (PQC) sandbox. The PQC sandbox allows you to get quantum resistant certificates in your hands to understand how they work with your systems.
In this episode we explore the potential PQC future for Microsoft Active Directory Certificate Services, aka MSCA. We discuss potential paths for Microsoft to take and their consequences.
Dr. Dave Chatterjee and David Close discuss the implications of post-quantum cryptography (PQC) on cybersecurity readiness. David, a Chief Solutions Architect at Futurex, explains the evolution of cryptographic methods to counter quantum computing threats. He highlights the importance of NIST's role in standardizing quantum-resistant algorithms like Kyber and Dilithium. David shares practical examples, such as Google and Cloudflare's hybrid TLS implementation and a financial institution's use of PQC for data storage. They emphasize the need for organizations to develop roadmaps, inventory cryptographic assets, and ensure vendor readiness. Dr. Chatterjee stresses the importance of a proactive, holistic approach to cybersecurity governance.To access and download the entire podcast summary with discussion highlights -- https://www.dchatte.com/episode-83-future-proofing-your-data-preparing-for-the-post-quantum-era/Latest Articles and Press Releases on The Cybersecurity Readiness Podcast Series:Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness, Yahoo!Finance, Dec 16, 2024Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness, Marketers Media, Dec 12, 2024.Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally, Business Insider/Markets Insider, Dec 10, 2024.Connect with Host Dr. Dave Chatterjee and Subscribe to the PodcastPlease subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712Latest Publications & Press Releases:“Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity,” Chicago Tribune, February 24, 2025.“Dr. Dave Chatterjee...
Migrating to post-quantum cryptography across an organization will take time. But while you are replacing every cipher to defend against the threat side of quantum computing, you may also want to add systems that bring new functionality and come with PQC out of the gate. Imagine a mobile messaging app like WhatsApp, but with NIST-approved ML-KEM under the hood and enterprise-grade controls. From hospitals dodging ransomware to finance professionals sharing secrets in quantum-proof chats, customers are already using this tool. Join host Konstantinos Karagiannis for a chat with Anurag Lal from NetSfere. For more information on NetSfere, visit www.netsfere.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
In our latest podcast episode, hosts Candace Gillhoolley, Frank La Vigne, along with Andy Schwaderer from Quantum Knight, dive into the critical need for upgrading security systems today to outpace tomorrow's quantum-powered threats. Key highlights include:Post-Quantum Cryptography: Andy Schwaderer explains the nuances of post-quantum cryptography, detailing how it updates current encryption techniques like RSA and AES to resist the immense computational power of emerging quantum computers. This is essential to protect against impending threats where quantum machines could rapidly crack today's encryption methods.The Looming Threat: The conversation also touches on "harvest now, decrypt later" risks, emphasizing how adversaries might hoard encrypted data today, intending to decrypt it once quantum computers become mainstream.Real-World Implications: Imagine critical infrastructure being tampered with or AI models poisoned with inaccurate data — scenarios that Quantum Knight's solutions aim to prevent.Making Security Accessible: Perhaps the most exciting takeaway from Quantum Knight's approach is how they make cryptographic security across various platforms not just robust but also accessible and easy to implement.This episode serves as a wake-up call to the very real security challenges of a quantum future and underscores the urgent need to act now to protect our data integrity and privacy.Quantum Moments00:00 "Quantum Computing Threatens Current Cryptography"04:14 Quantum Computing: Cybersecurity's New Threat08:33 Quantum Threats to Data Security11:40 Preparing for Quantum Data Threats15:53 Post-Quantum Cryptography Insights17:40 Quantum Machines: The Current Challenge23:00 Data Integrity and Authentication Breakthrough24:26 Medical Device Hacking Risks28:56 Verifying Human Identity Over AI33:27 PQC's Broad Impact and Challenges35:58 Simple Software SDK Solution40:08 Convincing C-Suite on Cybersecurity42:55 CISO/CIO Turnover Post-Breach Trend44:25 Bank Fines Highlight Regulatory Challenges47:30 Shift Focus from AI to Security52:38 AI Adoption and Market Reality55:41 Simplifying User Experience for Virality57:13 "Quantum Security Crisis Solutions"
In 2025, AI and quantum computing are transforming Asia's cybersecurity landscape, reshaping threats and roles. AI enhances defence capabilities but also fuels sophisticated attacks. Quantum computing threatens current encryption methods, necessitating a shift to quantum-safe algorithms. CISOs will do well to prioritize AI and quantum literacy to navigate these challenges. They must invest in post-quantum cryptography to safeguard against "harvest now, decrypt later" attacks and ensure AI defences are robust against adversarial attacks. Managing expectations while ensuring compliance is crucial as CEOs increasingly rely on these technologies for innovation and efficiency. Proactive strategies are essential for maintaining security and trust.In this PodChats for FutureCISO, Paul Tan, head of systems integration at Ensign InfoSecurity, talks about the evolving nature of cybersecurity strategies as technologies like AI and quantum computing accelerate their influence in cybersecurity defence and offense, and redefining the cybersecurity profession.Given that AI and quantum computing are rapidly reshaping the cybersecurity landscape, what immediate steps should CISOs in Asia take to ensure their teams possess the necessary AI and quantum literacy to navigate this evolving threat environment?In what ways are you observing AI being leveraged by both cybersecurity defenders and malicious actors, and what proactive measures can CISOs implement to stay ahead of these dual-use applications?Considering the potential vulnerabilities of AI-driven security systems to adversarial attacks like data poisoning, what strategies can CISOs employ to ensure the robustness and resilience of their AI defences?As quantum computing threatens to render current encryption methods obsolete, what is your recommended timeline for organisations to transition to quantum-safe cryptographic algorithms, and what are the key challenges in implementing these systems?With the advent of quantum computing, how should organisations reassess their strategies for protecting sensitive data against "harvest now, decrypt later" attacks, and what role does post-quantum cryptography play in this? Hybrid cryptographyHow do CEOs' and business unit leaders' high expectations for AI and Quantum computing impact the CISO's role in managing expectations, integrating these technologies into operations, and ensuring regulatory compliance?Let's recap: given what we know about AI and PQC, what is your advice for CISOs in 2025?
De belangrijkste IoT-trends en ontwikkelingen die te zien waren op het Mobile World Congres: A.I. die IoT data omzet in informatie, Satellieten binnen handbereik, eSIM-onwikkelingen, brain computer interfacing, extreem snelle en veilige WiFi communicatie via licht en tips van experts. Een extra lange aflevering met 12 interessante IoT-Gesprekken. Loop met mij mee op de beurs of scroll vooruit en... mis mijn samenvatting niet op 1:26:42 INHOUD: 1:09 Fairphone - Monique LempersRe- en upcycle tips van Monique voor de IoT industrie. 6:12 ETSI - Ton BrandTon zijn blik op de IoT-markt en technologie ontwikkelingen. https://www.etsi.org/standards#Connecting%20Things https://www.linkedin.com/in/tonbrand/14:54 Nordic Semiconductors - Frans Lutz vertelt over satellieten en de eSIM trends. https://www.nordicsemi.com/ https://www.linkedin.com/in/frans-lutz/ 21:55 rSIM - Daan de Wijs Uitleg wat de voordelen van een extra SIM-profiel in een SIM zijn. https://www.rsim.com/nl/https://www.linkedin.com/in/daandewijs/28:00 Zander Labs - Jaap van GentDe brain comuputer interface biedt mogelijheden die we nu nog niet voor mogelijk houden. https://www.zanderlabs.com/https://www.linkedin.com/in/jaapvangent/35:26 Semtech Sierra Wireless - Nicolas Damour[Engels] Nicolas praat ons bij over de IoT-markt en kijkt naar NB-IoT, LTE-M en LORA. https://www.sierrawireless.com/iot-modules/https://www.linkedin.com/in/nicolasdamour/40:36 NetMore - Marco SprenkelsMarco legt uit hoe zij als LoRaWAN operator klanten helpen met batterijgevoedde apparaten. https://netmoregroup.com/lorawan-netherlands/https://www.linkedin.com/in/marcosprenkels/50:03 PureLiFi - Sarah Scace en Alistair Banham[Engels] Communicatie via licht (LiFi) heeft vele voordelen t.o.v. WiFi. Nu er een industrie standaard is zijn de mogelijkheden voor gebruik onbegrensd. https://www.purelifi.com/https://www.linkedin.com/in/alistair-banham-73204a10/60:10 Telefonica - Jesus[Engels] Iedereen(!) moet begrijpen dat migratie naar Post-Quantum-Cryptography noodzakelijk is en aan specialisten vragen met PQC-migratie tijdig aan de slag te gaan. https://www.aivd.nl/documenten/publicaties/2024/12/3/het-pqc-migratie-handboek1:04:44 Afzal zijn blik op de IoT markt en de lancering van zijn nieuwe IoT-boek. De belangrijkste tips van Afzal als je met IoT aan de slag wilt gaan (en die gaan niet over technologie...) https://afzalmangal.com/https://www.linkedin.com/in/afzalmangal/1:15:41 Sateliot - Jordi [Engels] Jordi vertelt dat je met een gewone SIM en een standaard NB-IoT modem dat geschikt is voor gewone netwerken ook kunt gebruiken satellieten. https://sateliot.space/1:19:38 Mobile Ecosystem Forum (MEF) - Nassia Skoulikariti Programme Director for Mobile IoT [Engels] Nassia geeft een toelichting over IoT-innovatie en markt acceptatie. https://mobileecosystemforum.comhttps://www.linkedin.com/in/nassiaskoulikariti/1:26:42 Samenvatting van uw IoT podcasthost Robert Heerekop over het Mobile World congress 2025https://iotc360.com/https://www.linkedin.com/in/robertheerekop/_._
In part two of this episode, Paulina Gomez, Ryan Lafler, Doug Schremp, and Paola Osorio delve into Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC) algorithms. They discuss the principles of QKD, its challenges, and industry progress, as well as the development of PQC algorithms to deliver quantum-resistant encryption solutions. They also explore future milestones and the solutions that are available today to safeguard critical data and mitigate the quantum computing threat to enable quantum-secure communications.
"The internet is changing—it's no longer just about content. It must evolve into a data exchange fabric," says Khalid Raza, CEO & Founder, Graphiant. In this Technology Reseller News Podcast, Khalid, joins Doug Green to discuss Graphiant's new Data Assurance Service, the future of telcos, and how AI-driven networking will redefine the internet. Graphiant's Mission: The Internet for AI, Not Just Content From Content Delivery to Data Exchange – The internet was built for content distribution, but AI and cloud computing require seamless data exchange between enterprises, partners, and applications. The Future is Programmable Networking – Graphiant envisions a cloud-based service plane, decoupled from hardware, enabling real-time visibility, security, and automation. New Data Assurance Service: Protecting Data in Motion Graphiant's Data Assurance Service ensures data security, regulatory compliance, and real-time visibility as data moves across global networks. Path Control – Companies can restrict data routes, avoiding certain countries or network vendors due to security or compliance concerns. Real-Time Threat Detection – Graphiant monitors and stops breaches in seconds by analyzing egress traffic and suspicious IP destinations. Security-Driven Routing – “Rather than routing driving security, security should drive routing.” A Message to Telcos: Stop Being Just a Transport Provider From Telco to TechCo – Service providers must move beyond just selling connectivity and become data intelligence companies. Software-Defined Networking – Traditional networking vendors tie services to hardware, but Graphiant enables cloud-based, software-defined services that can be updated instantly. B2B Data Exchange is the Next Frontier – AI-driven businesses need fast, secure, and intelligent data sharing between partners. Telcos can own this opportunity. Upcoming Graphiant Innovations: AI & Post-Quantum Security Agentic AI & Distributed Data Access – AI models require real-time access to distributed data sources. Networking must keep up with AI's exponential data needs. Post-Quantum Cryptography (PQC) – Graphiant will launch PQC capabilities in 2024, ensuring future-proof encryption against quantum computing threats. Where to Learn More Graphiant Website: www.graphiant.com Follow Graphiant on LinkedIn for updates on their B2B launch in March. #AI #DataSecurity #Networking #TelecomTransformation #CloudComputing #DataExchange #TechInnovation #Graphiant
We talk a lot about Shor's Algorithm in our discussion of post quantum cryptography (PQC). In this episode Jason explains Shor's algorithm for non-quantum physicists.
YouTube: https://youtu.be/hcdk3u2R5Mo Yesterday, I gave two short presentations on PQC (Post Quantum Cryptography), and next week, I'm in London to give a more focused talk on the subject. And so, it's great to see that Samsung is driving forward the adoption of PQC methods in their new S25 smartphone. There are two companies that have a core focus on creating trusted hardware for consumers: Apple and Samsung. Apple has always had a core focus on making sure they use the best cryptography to not only secure their devices but also to make them privacy-aware. Samsung, too, has strived for improved security but, at times, has made a few slip-ups along the way, but always patched around them. Now, Samsung Electronics has integrated PQC into their Galaxy S25 series of devices. The need for this is that NIST will deprecate all our existing public key methods in 2030, including: RSA for public key encryption; RSA, ECDSA and EdDSA for signatures; and ECDH for key exchange. NIST will then remove them in 2035 from the NIST FIPS 140 standard. Given that a smartphone will have a life of at least five years, it makes sense to build the hardware to support the migration. Along with this, we see the rise of “harvest now, decrypt later” threats, where network traffic could be captured now and then decrypted sometime in the future. The main integration at the current time involved ML-KEM (FIPS 203, aka Kyber) and ML-DSA (FIPS 204, aka Dilithium). With ML-KEM we replace key exchange and public key encryption methods, while ML-DSA provides us with digital signing: These methods will be the Samsung Knox Matrix for enhanced data protection — this includes end-to-encryption for back-ups and the recovery of data from the Samsung Cloud. Overall, Samsung devices, like Apple hardware, have a secure enclave to store private and secret keys, and where not even Samsung can get access to them. The usage of PQC will mean that Samsung devices will be able to communicate with other devices in the future and which are using PQC methods. This ensures not only current compatibility but also future compatibility. An important advancement of the industry is that Samsung will support PQC methods for their backup system to their Cloud. Conclusions Of course, the integration will not force applications and services to use PQC, and in most cases, it will still use our traditional methods, as devices that it connects to must support PQC. Thus, we will see a migration towards PQC, rather than a hard switch-over. In cryptography, this is often the case, as we can typically negotiate the cryptography methods that are used in the secure transmission or storage of data. Once all the required services and applications support PQC, our existing public key methods will likely be switched off.
In this episode, guest Alexandre Giron explains what is needed to support post quantum cryptography (PQC) with ACME.
I'm always asked the same question when talking to customers about the threats of quantum computing and the move to post-quantum cryptography. What are similar companies doing about it? It's only been half a year since the NIST standards were published, but we're starting to see some traction. Join host Konstantinos Karagiannis for a chat with Samantha Mabey from Entrust about an interesting study on migration, along with some tactical advice for getting your PQC journey underway. For more information on Entrust, visit www.entrust.com/. Read the PKI and PQ study here: www.entrust.com/cybersecurity-institute/reports/2024-pki-and-post-quantum-trends-study. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
Harvest and decrypt is a well-known attack vector against traditional cryptography prior to PQC. In this episode, we discuss what enterprises should be doing today to defend themselves against harvest and decrypt.
Welcome to the latest episode of the Dave and Dharm Demystified Podcast, where we dive deep into the world of innovation and emerging technologies. Today, we're thrilled to be joined by Steve Suarez, CEO of Horizon X and former Head of Innovation at HSBC, who is helping shape the future of quantum computing in financial services. Steve brings unparalleled insight into the transformative power of quantum, sharing his work on cutting-edge initiatives like The Quantum Innovation Index, which ranks industries and institutions on their quantum readiness, and his collaboration with MIT on accessible quantum courses for business leaders. In this episode, we'll explore: > Why 2025 is a pivotal year for quantum preparation. >The urgency of post-quantum cryptography (PQC) and how to safeguard against Q-Day. > How the newly launched Quantum Innovation Index can help industries benchmark their progress in adopting this game-changing technology. >The practical steps financial institutions can take today to stay ahead in the quantum race, such as getting educated about the subject! Steve's passion for quantum isn't just about the technology—it's about building a bridge between quantum's potential and real-world applications. Whether you're a fintech innovator or a banking executive, this episode will leave you with actionable insights on preparing for the quantum revolution. So, sit back and join us as we demystify quantum computing with one of the leading voices in the field. Let's dive in! Quantum Innovation Index: https://thequantumindex.com/ MIT XPro: https://learn-xpro.mit.edu/horizonx
In this episode we are joined by Dr. Michela Mosca. We discuss his pioneering work identifying the need for post-quantum cryptography, where PQC stands today, and what the future may hold.
Many companies call 2025 the year of quantum computing for reasons ranging from PQC to better applications and hardware. Here comes the Helios system from Quantinuum, and we say it's all right to celebrate 50 logical qubits this year. We look at the company's roadmap, aggressive error-correction ratios, and some innovative ways the coming systems will work with AI to solve problems and not just generate hype. Join host Konstantinos Karagiannis for a chat with CEO Rajeeb Hazra from Quantinuum. For more information on Quantinuum, visit www.quantinuum.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
We talk with guest Sofia Celi of Brave Browser, who leads the IETF PQC standardization effort, about the process of setting standards for PQC-compatible digital certificates. We learn about expected timelines, hybrid strategies, the NIST PQC onramp's role, and more.
2024 was an eventful year for post quantum cryptography (PQC). This includes FIPS standards, the PQC onramp, and the dawn of widespread interest among IT professionals.
We make our 2025 predictions. Topics include maximum certificate term, AI, post-quantum cryptography (PQC), deep fakes, and more.
Repeat guest Bruno Coulliard of Crypto4A joins us to define a quantum-safe (or PQC enabled) hardware security module.
As part of its post-quantum cryptography (PQC) initiative NIST has released a draft deprecating RSA-2048 and ECC 256 by 2030 and disallowing them by 2035. We get into the details.
Among many other milestones, 2024 was the year generative AI went mainstream, identity fraud went digital first, and the first post quantum cryptography (PQC) standards were issued by NIST. As we look ahead to 2025, which cyber trends will gain momentum? And which will fall to the wayside? In this podcast, we'll delve into our top cyber predictions for 2025 including the possible evolution of AI, quantum computing, digital identity, and regulation.
We discuss how a potential break of Chrome from Google would affect the WebPKI. We look at product changes, resourcing, post-quantum cryptography (PQC), innovation, moonshot initiatives, and other public CAs.
NIST has narrowed its PQC onramp contest to 15 candidates. We go over who remains and the makeup of the remaining candidates.
Repeat guest Bruno Couillard argues that cryptography is part of the foundational fabric of our lives and that the transition to PQC is an existential requirement.
The PQC community likes to debate when crypto relevant quantum computers will be available, which is sometimes called "Q day." In this episode we explain how radically oversimplified this concept is and dive into the nuances of what a "cryptographically relevant quantum computer" really will be.
Quantum computing will revolutionize industries and break conventional encryption threatening the world's digital economy and upending global power dynamics. With “harvest now, decrypt later” style attacks that target long life data and devices, along with the availability of new PQC standards from NIST, we are at the dawn of the PQ era. In this podcast, we delve into global PQ preparedness, post quantum cryptography, and how to start your PQC migration today.
Video Episode: https://youtu.be/yyl2icu6o3I In today’s episode, we discuss groundbreaking research from Chinese scientists who demonstrated that D-Wave's quantum computers can break RSA encryption and threaten widely used cryptographic methods, emphasizing the urgency for quantum-safe solutions. We also cover the aftermath of a significant cyberattack on Clorox, which has impacted its sustainability goals, and analyze a report from Checkmarx detailing “command jacking” vulnerabilities in open source packages, highlighting the need for robust security measures in software development. Join us as we unpack these critical cybersecurity developments and their implications for businesses and the future of data protection. Source articles: 1. https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html 2. https://www.cybersecuritydive.com/news/clorox-cyberattack-waste-reduction-goals/729642/ 3. https://www.csoonline.com/article/3560931/open-source-package-entry-points-could-be-used-for-command-jacking-report.html Timestamps 00:00 – Introduction 00:57 – Quantum Cracks RSA 02:26 – Clorox behind on plastic reduction 04:41 – Command Jacking in OSS 1. What are today’s top cybersecurity news stories? 2. How are quantum computers threatening RSA encryption? 3. What impact did Clorox's 2023 cyberattack have on its sustainability goals? 4. What is command jacking in open source software? 5. How can D-Wave’s quantum computers break cryptographic systems? 6. What are the implications of quantum computing for data security? 7. How did Clorox recover from its major cyberattack? 8. What vulnerabilities exist in open source package managers? 9. Why is post-quantum cryptography important for cybersecurity? 10. What strategies can developers implement to safeguard against package entry point vulnerabilities? D-Wave, quantum computing, RSA encryption, cryptographic solutions, Clorox, cyberattack, sustainability, plastic waste, Checkmarx, command jacking, malicious code, security checks, 1. **RSA Encryption** – *Definition*: A widely used public-key cryptographic system that relies on the computational difficulty of factoring large integers, ensuring secure data transmission. – *Importance*: RSA is foundational to numerous secure communications over the internet, and its potential vulnerability to quantum attacks could compromise global data integrity and confidentiality. 2. **Quantum Computer** – *Definition*: A type of computer that uses quantum bits (qubits) and principles of quantum mechanics, enabling it to process complex computations significantly faster than classical computers. – *Importance*: Quantum computers, by their nature, pose significant threats to classical cryptographic systems due to their ability to solve problems deemed infeasible for traditional computers, such as factoring large numbers. 3. **D-Wave** – *Definition*: A company specializing in the development of quantum computing systems, particularly known for its quantum annealing technology. – *Importance*: D-Wave’s systems are central to the study showcasing quantum capabilities to break traditional encryption, illustrating the practical advancements in quantum technologies. 4. **Quantum Annealing** – *Definition*: A quantum computing technique used to find the global minimum of a given objective function over a set of candidate solutions, particularly useful in optimization problems. – *Importance*: This technique has been demonstrated to potentially break encryption by optimizing and solving cryptographic problems more efficiently than classical methods. 5. **Substitution-Permutation Network (SPN)** – *Definition*: A method used in the design of block ciphers, which is based on a series of linked mathematical operations involving substitution and permutation. – *Importance*: SPN forms the basis for various encryption algorithms, and compromising it indicates vulnerabilities in widely used cryptographic systems. 6. **Advanced Encryption Standard (AES)** – *Definition*: A symmetric encryption algorithm adopted as the standard for encrypting data by the U.S. government, based on the Rijndael cipher. – *Importance*: AES is critical for securing sensitive information worldwide, and any threat to its integrity threatens global cybersecurity structures. 7. **Post-Quantum Cryptography (PQC)** – *Definition*: A branch of cryptography focused on developing algorithms resistant to attacks from quantum computers. – *Importance*: With quantum computing emerging as a threat to current cryptographic systems, PQC aims to secure communications in a quantum-capable future. 8. **Public-Key Cryptography** – *Definition*: A cryptographic system that uses pairs of keys: public keys that may be disseminated widely, and private keys which are known only to the owner. – *Importance*: It is pivotal for numerous secure transactions and encrypted communications on the internet, underpinning the security of data exchanges. 9. **Encryption** – *Definition*: The process of encoding information in such a way that only authorized parties can access it, rendering the data unreadable to unauthorized users. – *Importance*: It is essential for protecting sensitive information across all forms of digital communication against unauthorized access and data breaches. 10. **Quantum-Safe Encryption** – *Definition*: Encryption methods that are secure against decryption by quantum computers, typically developed as part of post-quantum cryptographic efforts. – *Importance*: As quantum computing progresses, developing quantum-safe methods is crucial to maintain the security of data and communications against future quantum threats.
In this episode we give a high-level explanation of what happens in a TLS 1.3 handshake and then discuss what will happen when PQC is included.
Imagine a mesh network of AI-powered nodes that could validate the security of your organization's systems and applications. It's a clever use of blockchain to add security to real-world devices, and, best of all, it will feature post-quantum cryptography. How soon will this technology simplify security for businesses and governments worldwide? And might this kind of approach even prevent killer robots? Join host Konstantinos Karagiannis for a chat with David Carvalho and David Holtzman from Naoris Protocol. For more on Naoris Protocol, visit www.naorisprotocol.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Compromise of old hostname .mobi whois server https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/ Microsoft Reconsidering Security Tool API https://blogs.windows.com/windowsexperience/2024/09/12/taking-steps-that-drive-resiliency-and-security-for-windows-customers/ Microsoft implents PQC in SymCrypt https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-s-quantum-resistant-cryptography-is-here/ba-p/4238780 GitLab Patch https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/#execute-environment-stop-actions-as-the-owner-of-the-stop-action-job
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Compromise of old hostname .mobi whois server https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/ Microsoft Reconsidering Security Tool API https://blogs.windows.com/windowsexperience/2024/09/12/taking-steps-that-drive-resiliency-and-security-for-windows-customers/ Microsoft implents PQC in SymCrypt https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-s-quantum-resistant-cryptography-is-here/ba-p/4238780 GitLab Patch https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/#execute-environment-stop-actions-as-the-owner-of-the-stop-action-job
Patch Tuesday rundown. Microsoft integrates post-quantum cryptography (PQC) algorithms into its SymCrypt cryptographic library.The FTC finalizes rules to combat fake reviews and testimonials. A payment card thief pleads guilty. On our latest CertByte segment, N2K's Chris Hare and George Monsalvatge share questions and study tips from the Microsoft Azure Fundamentals (AZ-900) Practice Test. Hard Drive Heaven: How Iconic Music Sessions Are Disappearing. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's Microsoft Azure Fundamentals (AZ-900) Practice Test. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. Reference: What is public cloud? (RedHat) Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Remembering 9/11 In today's episode, we pause to honor and remember the lives lost on September 11, 2001. We pay tribute to the courageous first responders, the resilient survivors, and the families whose lives were forever altered by that tragic day. Amidst the profound loss, the spirit of unity and compassion shone brightly, reminding us of our shared humanity. Additionally, you can check out our special segment featuring personal remembrances from N2K CyberWire's very own Rick Howard, who was in the Pentagon on that fateful day. His reflections provide a heartfelt perspective on the events and are well worth your time. Tune in to hear his poignant insights. Special Edition Podcast In today's special edition of Solution Spotlight, we welcome Mary Haigh, Global CISO of BAE Systems, as she sits down with N2K's Simone Petrella. Together, they discuss moving beyond the technical aspects of cybersecurity to build and lead a high-performing security team. Selected Reading Microsoft Fixes Four Actively Exploited Zero-Days (Infosecurity Magazine) Adobe releases september 2024 patches for flaws in multiple products, including critical (Beyond Machines) Chrome 128 Update Resolves High-Severity Vulnerabilities (SecurityWeek) ICS Patch Tuesday: Advisories Published by Siemens, Schneider, ABB, CISA (SecurityWeek) Ivanti fixes maximum severity RCE bug in Endpoint Management software (Bleeping Computer) Microsoft Adds Support for Post-Quantum Algorithms in SymCrypt Library (SecurityWeek) Federal Trade Commission Announces Final Rule Banning Fake Reviews and Testimonials (Federal Trade Commission) Hacker pleads guilty after arriving on plane from Ukraine with a laptop crammed full of stolen credit card details (Bitdefender) Inside Iron Mountain: It's Time to Talk About Hard Drives (Mixonline) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach top security leaders. Explore our network sponsorship opportunities and build your brand where industry leaders get their daily news. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
One seldom discussed consequence of quantum computers and PQC is the move from cryptographic homogeneity to cryptographic heterogeneity, with multiple KEMs and DSAs eventually expected as ongoing standards. We examine the consequences of this change.
Respondendo dúvidas. Esse episódio será num formato pergunta e resposta, o que vou batizar de PQC, pergunte-me qualquer coisa. Hoje vou falar de exercícios, como programar para não se machucar ou para favorecer a recuperação. Minha opinião sobre coca zero e afins, falarei de novo de doce de leite, de quantidade de whey, de hitt, responderei ainda outras coisas sobre jejum, sobre janela pós e sobre picos de cortisol e exercícios. Responderei duvidas especificas de horários de pré treino em casos específicos. Enfim, de novo um mix de perguntas diversas que ainda surgiram e que acho que se ainda estão perguntando é porque eu não fui tão clara quanto gostaria. Eu realmente quero que vocês entendam o raciocínio, porque a vida acontece e eu quero que você consiga poder pensar sozinha no que será melhor para você. Site do podcast https://isabelafortes.com.br/ instagram https://www.instagram.com/fortes_isabela/ Suplementos proteínas que eu recomendo nos EUA FULLSCRIPT COM DESCONTO DE 10% AUTOMATICAMENTE APLICADO https://us.fullscript.com/plans/ifortes-proteinas-proteins NA AMAZON https://www.amazon.com/shop/fortes_isabela/list/13XWTA71MS4LB?ref_=cm_sw_r_cp_ud_aipsflist_aipsffortes_isabela_HFBC69CHYHTNMD2D3D9W Suplementos de proteínas que eu recomendo no Brasil FARMACIA FORMULA Pedir por telefone ou whatsapp o Whey Fortes na farmacia Formula +55 51 99107-2838 Use cupom: ISABELA10 para desconto de 10% PARA OS VEGETARIANOS Super coffee, proteína vegetal, leite de castanha https://www.mahta.bio/isabelafortes Cupom ISABELAFORTES será aplicado imediatamente na sua primeira compra. ESSENTIAL NUTRITION https://www.essentialnutrition.com.br/catalogsearch/result/?q=%22proteina%22 Os clientes da Isabela tem desconto especial na Essential, entre em contato diretamente com a Isabela para obter o seu. Outros episódios relacionados com esse tema: EP 12 | Armadura Corporal: Proteína para construção de massa muscular e perda de peso | Isabela Fortes EP 61 | Potpourris: Tirando dúvidas | Isabela Fortes EP 74 | Pré e Pós Treino: O que consumir antes e depois dos exercícios | Isabela Fortes EP 73 | Tudo sobre Proteínas em pó, Whey e Colágeno | Isabela Fortes Produção: Wepod
NIST recently released PQC algorithmic standards in FIPS-203, FIPS-204, and FIPS-205 (ML-KEM, ML-DSA, and SLH-DSA). We describe what is necessary for enterprises to begin using these algorithms.
Respondendo dúvidas. Esse episódio será num formato pergunta e resposta, o que vou batizar de PQC, pergunte-me qualquer coisa. O tema de hoje será um mix ao redor de saúde feminina, exercícios, ainda dúvidas específicas de pré e pós treino porque recebi várias perguntas interessantes, com curiosidades diversas sobre mulheres após os 40, como porque meu cheiro mudou, porque agora estou tonta, o que fazer com dores musculares. Vou falar de beta alanina. Atualizar alguns dados sobre creatina, sobre o impacto da creatina no marcador creatinina no seu exame de sangue, sobre tontura e exercícios, mudança de odor corporal e outras perguntas que eu recebi. Site do podcast https://isabelafortes.com.br/ instagram https://www.instagram.com/fortes_isabela/ Suplementos proteínas que eu recomendo nos EUA FULLSCRIPT COM DESCONTO DE 10% AUTOMATICAMENTE APLICADO https://us.fullscript.com/plans/ifortes-proteinas-proteins NA AMAZON https://www.amazon.com/shop/fortes_isabela/list/13XWTA71MS4LB?ref_=cm_sw_r_cp_ud_aipsflist_aipsffortes_isabela_HFBC69CHYHTNMD2D3D9W Suplementos de proteínas que eu recomendo no Brasil FARMACIA FORMULA Pedir por telefone ou whatsapp o Whey Fortes na farmacia Formula +55 51 99107-2838 Use cupom: ISABELA10 para desconto de 10% PARA OS VEGETARIANOS Super coffee, proteína vegetal, leite de castanha https://www.mahta.bio/isabelafortes Cupom ISABELAFORTES será aplicado imediatamente na sua primeira compra. ESSENTIAL NUTRITION https://www.essentialnutrition.com.br/catalogsearch/result/?q=%22proteina%22 Os clientes da Isabela tem desconto especial na Essential, entre em contato diretamente com a Isabela para obter o seu. Outros episódios relacionados com esse tema: https://isabelafortes.com.br/ep-11-porque-manter-a-vagina-saudavel-e-importante-para-a-saude-da-mulher/ EP 12 | Armadura Corporal: Proteína para construção de massa muscular e perda de peso | Isabela Fortes EP 61 | Potpourris: Tirando dúvidas | Isabela Fortes EP 74 | Pré e Pós Treino: O que consumir antes e depois dos exercícios | Isabela Fortes EP 73 | Tudo sobre Proteínas em pó, Whey e Colágeno | Isabela Fortes
They're here! After a seven-year process, NIST has finally released the first standards for post-quantum cryptography. The industry is excited and optimistic about the future, but what does it mean for you and your organization? In an interview recorded right before the August 13 release, you'll hear how we got here with the quantum computing threat, what standards were selected and what additional ciphers are coming in the future. You'll also get a sense of how soon you may need to start implementing the new Key Encapsulation Mechanisms (KEMs) and Digital Signatures. Join host Konstantinos Karagiannis for a wide-ranging PQC primer chat with mathematician Dustin Moody from NIST. For more on the new NIST standards, visit https://csrc.nist.gov/projects/post-quantum-cryptography.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
Cisco Talos discovers vulnerabilities in Microsoft applications for macOS. OpenAI disrupts an Iranian influence campaign. Jewish Home Lifecare discloses a data breach affecting over 100,000. Google tests an auto-redaction feature in Chrome for Android. Unicoin informs the SEC that it was locked out of G-Suite for four days. House lawmakers raise concerns over China-made WiFi routers. Moody's likens the switch to post-quantum cryptography to the Y2K bug. Diversity focused tech nonprofits grapple with flagging support. Tim Starks of CyberScoop is back to discuss his investigation of a Russian hacking group targeting human rights groups. Smart phones get some street smarts. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We welcome Tim Starks of CyberScoop back to discuss his story "Russian hacking campaign targets rights groups, media, former US ambassador." Selected Reading Vulnerabilities in Microsoft's macOS apps could help hackers access microphones and cameras (The Record) OpenAI Disrupts Iranian Misinformation Campaign (The New York Times) 100,000 Impacted by Jewish Home Lifecare Data Breach (SecurityWeek) Chrome will redact credit cards, passwords when you share Android screen (Bleeping Computer) Crypto firm says hacker locked all employees out of Google products for four days (The Record) House lawmakers push Commerce Department to probe Chinese Wi-Fi router company (CyberScoop) Moody's sounds alarm on quantum computing risk, as transition to PQC ‘will be long and costly' (Industrial Cyber) The movement to diversify Silicon Valley is crumbling amid attacks on DEI (Washington Post) Google's Stunning New Android AI Feature Instantly Locks Phone Thieves Out (Forbes) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices