Every new year we make predictions for the year to come, and every year we go back and see how we did. This is the first of two parts scoring our 2025 predictions.
Ressources
Un CBOM donne aux entreprises une visibilité sur les actifs cryptographiques, améliorant ainsi la gouvernance, la gestion des risques et la préparation à la sécurité post-quantique.
We discuss the idea that not all cryptographic entropy is equally "random" and potential consequences.
Root Causes 571: Will There Ever Be a Cryptographically Relevant Quantum Computer?
We discuss the idea that it might be impossible to actually create a cryptographically relevant quantum computer and weigh in on this idea.
Repeat guest Chris McGrath shares what enterprises need to be doing now to stay on track for the NIST PQC deadline in 2030.
Repeat guest Chris McGrath joins us to discuss how increasingly strict regulations are requiring increased rigor, visibility, and auditability for enterprise digital certificates and PKI.
Senior cyber security advisor Chris McGrath joins us to discuss redefining digital certificates and their role in your organizational security profile, increasing regulation of certificates, and how enterprises can up their certificate game.
BIMI renforce la sécurité des boîtes de réception et la confiance dans les marques en affichant des logos vérifiés sur les courriels authentifiés à l'aide de DMARC et de certificats de marque.
We name the ten enterprise environments and use cases that are most likely to be late adopters of post quantum cryptography (PQC).
We discuss the foundational importance of time in PKI and security in general. This includes when things happen, the order in which things happen, and attacks based on time-spoofing. We drill down on certificates, roots, timestamping, Certificate Transparency, patching, audits, and PQC.
In our concluding episode on the topic, we scrutinize arguments make for and against QWACs, this time focused on "compliance and interoperability."
In our second of three episodes on the topic, we scrutinize arguments make for and against QWACs, this time focused on "governance and sovereignty."
Comment les États et les collectivités locales peuvent-ils renforcer la cybersécurité en 2026 ?
En 2026, les États et les collectivités locales devront adopter l'automatisation, la confiance zéro et la gestion du cycle de vie des certificats pour renforcer leur résilience en matière de cybersécurité.
Environ 72 % des entreprises ont connu une interruption liée à un certificat au cours des deux dernières années. Les interruptions liées aux certificats se produisent lorsque les certificats numériques expirent ou deviennent invalides, ce qui entraîne des problèmes de sécurité et de fonctionnement.
As a follow up to our episode 546, we break down the first of three sets of arguments about QWACs and examine their level of validity.
You may have heard of side channel attacks. Now Jason explains what a side oracle attack is and how a side oracle attack in conjunction with AI could be effective against the HQC or Falcon PQC algorithms.
One of the NIST Round 3 PQC finalists that was never selected or eliminated is Classic McEliece. In this episode we explain in non-math terms how this algorithm works.
Continuing our examination of AI in 1000 days, we discuss the use of finely tuned small language models for highly specific use cases.
Besoin d'aide ?
Besoin d'aide pour effectuer un achat ? Contactez-nous dès aujourd'hui pour que votre certificat soit délivré immédiatement.

