Ressourcen
We describe three different kinds of logical qubits with their relative strengths and weaknesses.
Jason explains the extreme danger of side channel attacks in the new post quantum cryptography (PQC) era.
The reliability of cryptographic algorithms is largely a matter of conjecture based on track record. Proving security is impaired by the difficulty of formal verification, implementation weaknesses, and failure in randomness.
The first of the five pillars of Certificate Lifecycle Management (CLM) is discovery. While many of your certificates are easily discoverable, some difficult PKI remains.
The UK Online Safety Act intends to force vendors who sell hardware and software to allow the government to scan end-to-end encrypted communication on end devices.
Google has taken a strong position supporting Merkle Tree Certificates (MTC) as the PQC-enabled future for SSL / TLS.
Sectigo Private PQC ermöglicht ein sicheres, praxisnahes Testen von Post-Quantum-Zertifikaten im SCM und unterstützt Unternehmen bei der Vorbereitung ohne zusätzliches Risiko.
Root Causes 604: Accelerated Timeline for Quantum Computers Breaking ECC in Crypto and Blockchain
A new paper from Google Quantum AI and others documents a new technique for breaking ECC, particularly the curve protecting crypto currencies, smart contracts, and blockchain. This accelerates post quantum cryptography (PQC) timelines.
Root Causes 603: Cryptographically Relevant Quantum Computing (CRQC) with Only 10,000 Qubits
New research suggests that a cryptographically relevant quantum computer is achievable with only 10,000 qubits. This was an important contributor to Google moving its PQC target to 2029.
Google has announced that it is moving its target for full PQC support to 2029. This is a strong statement from one of the most knowledgeable PQC technology companies that the existing 2030 target is too late.
Legacy PKI implementations hold back technical progress and create security risk. We discuss reasons why, consequences, and what to do about it.
In our previous episode we defined cryptography as the new geopolitics. We follow up to explain how all cryptographic decisions reflect social, political, and legal viewpoints of the cryptography's designers.
In the last decade or so, nations around the world have become keenly determined to use cryptography for their own legal, economic, and military advantage. We explore this concept.
A recent CISA report declares that the nation's OT infrastructure is incapable of keeping up with the crypto agility and certificate management needs that modern security demands. We examine this finding.
Einfache elektronische Signaturen verifizieren E-Mails, aber nicht die Identität. Geprüfte digitale Signaturen schaffen Vertrauen, Sicherheit und Beweise für professionelle Dokumente.
Die Umstellung auf 6-monatige SSL/TLS-Zertifikate ab März 2026 erhöht den Erneuerungsdruck und macht die Automatisierung für Skalierbarkeit und Risikominderung unerlässlich.
Microsoft has publicly stated that it will hand over Bitlocker keys to US law enforcement agencies without requiring a subpoena or court order.
Benötigen Sie Hilfe?
Benötigen Sie Hilfe beim Kauf? Kontaktieren Sie uns noch heute, um Ihr Zertifikat sofort zu erhalten.

