The CXO’s guide to Quantum Security Customers often tell me that the migration to post-quantum cryptography (PQC) will take them years, and some assets won’t ever be upgraded. While quantum’s long-term threat is clear, security leaders are grappling with the practical, multiyear journey of upgrading potentially thousands of devices, applications and data stores to be quantum-resistant. The “harvest now, decrypt later” threat raises the stakes. Nation-state actors are siphoning and stockpiling encrypted data today, waiting for the arrival of quantum computers to retroactively break it. The implication? Sensitive data may already be in the wrong hands and it’s only a matter of time before it can be put to use. What CXOs need is a clear path forward: Discover - Complete a comprehensive crypto inventory across your environment. You cannot protect what you cannot see. Protect - Achieve post-quantum decryption at scale with NGFW that have crypto-agility built right in, enabling your security as standards evolve. Accelerate - Leverage segmentation along with emerging new capabilities, like cipher translation, to instantly upgrade legacy devices and applications to secure your data now while your organization upgrades devices and applications. Read more https://bit.ly/4nVkurw
Data Encryption Methods
Explore top LinkedIn content from expert professionals.
-
-
✏️CEPS (Centre for European Policy Studies) has just published the report "Strengthening the EU transition to a quantum-safe world" This 125-page publication offers a comprehensive and very timely analysis of the global transition toward quantum-safety, highlighting key recommendations and identifying the hurdles that we, as a community, still need to overcome. Accross its 10 general recommendations and 16 additional sector-specific ones, two key aspects take a prominent role: 👉 Operational challenges of the transition, like establishing business-level priorities, building executive support, addressing the limited cryptographic talent issue, cryptographic homogeneization in products, and building cryptographic inventories based on priorities. 👉 Coordination and the role for regulators, identifying that the EU lacks a coherent, unified transition framework, the need to ensure alignment and coherence across roadmaps and the risks of a fragmented transition. Key conclusions on the later, aligned with previous statements from the Europol Quantum Safe Financial Forum and FS-ISAC, is that quantum-safety is already part of the EU's operational resilience compliance through the “state of the art” security principle embedded in GDPR, DORA, CRA and NIS2. However, there is a recognised need for further guidance that can be achieved through open collaboration between the public and private sector. Although the report focuses on the financial, public, and defence sectors, its main takeaways can easily be extended to other critical domains—transport, energy, healthcare, and many more. The principles are the same, and the urgency is the same. This report is an important step forward, and my hope is that the ideas it lays out help shape the conversations and, more importantly, the actions we need across the EU. A well-aligned and coordinated transition is essential if we want the whole ecosystem to move toward a new age where we manage cryptography in a more mature, proactive, and resilient way. Kudos to CEPS, lorenzo pupillo, Carolina Polito, Swann A. and Afonso Ferreira, PhD for achieving this milestone. https://lnkd.in/dpWJ86q2
-
ASD and partners have released a guide to "Managing cryptographic keys and secrets", and given the current wave of infostealer-originated compromises, it's well worth a read. Key takeaways (pardon the pun) are: 🔑 Your organization needs a Key Management Plan (KMP) that articulates the threats to cyrptographic material as well as mitigation and response strategies 🔑 Key generation is best achieved using Hardware Security Modules (HSMs) - as famous computer scientist Donald Knuth said in "random numbers should not be generated with a method chosen at random" 🔑 Keys need to be stored with least privilege (separation of duties) and strong access controls, and distributed securely 🔑 Deploy effective logging and monitoring, and conduct audits 🔑 Plan for key rollovers and destruction, with keys having defined maximum usage periods 🔑 Prepare for transition to quantum-resistant algorithms There is a lot more detail in the guide, including links to the relevant standards. This is a good starting point for developing a policy and KMP for your organization, especially if you need to comply with ISM or FIPS. What the guide does not cover is practical implementation advice, such as how to automate trusted key management processes - SPIFFE (Secure Production Identity Framework For Everyone) is perhaps better suited for more technical practitioners. 📘 "Managing cryptographic keys and secrets": https://lnkd.in/gwvGQ5ep 📘 [Mentioned] SPIFFE: https://lnkd.in/g9bGHTP2
-
Breakthrough for the #quantum internet: For the first time a major telco provider has successfully conducted entangled photon experiments - on its own infrastructure. ➡️ 30 kilometers, 17 days, 99 per cent fidelity. Our teams at T-Labs have successfully transmitted entangled photons over a fiber-optic network. Over a distance comparable to travelling from Berlin to Potsdam. The system automatically compensated for changing environmental conditions in the network. Together with our partner Qunnect we have demonstrated that quantum entanglement works reliably. The goal: a quantum internet that supports applications beyond secure point-to-point networks. Therefore, it is necessary to distribute the types of entangled photons. The so-called qubits, that are used for #QuantumComputing, sensors or memory. Polarization qubits, like the ones used for this test, are highly compatible with many quantum devices. But: they are difficult to stabilize in fibers. From the lab to the streets of Berlin: This success is a decisive step towards the quantum internet. 🔬 It shows how existing telecommunications infrastructure can support the quantum technologies of tomorrow. This opens the door to new forms of communication. Why does this matter for people and society? 🗨️ Improved communications: The quantum internet promises faster and more efficient long-distance communications. 🔐 Maximum security: Entanglement can be used in quantum key distribution protocols. Enabling ultra-secure communication links for enterprises and government institutions 💡Technological advancement: high-precision time synchronization for satellite networks and highly accurate sensing in industrial IoT environments will need entanglement. Developing quantum technologies isn’t just a technical challenge. A #humancentered approach asks how these systems can be built to serve real needs and be part of everyday infrastructure. With 2025 designated as the International Year of Quantum Science and Technology, now is the time to move from research to readiness. Matheus Sena, Marc Geitz, Riccardo Pascotto, Dr. Oliver Holschke, Abdu Mudesir
-
🔐 Data in Use --Protection Strategies ⚠️ The Challenge When data is being processed in memory (RAM/CPU), it’s usually decrypted, which makes it vulnerable to: 💥 Insider threats 💥 Malware/memory scraping 💥 Cloud provider access ✅ Solutions for Data in Use 1. Homomorphic Encryption (HE) Data stays encrypted even during computation. Supports analytics, AI/ML, and calculations without exposing raw values. 💥 Use case: A hospital can run statistics on encrypted patient data without seeing individual records. Downside: Very slow for large-scale real-time workloads (still improving). 2. Secure Enclaves / Trusted Execution Environments (TEEs) Hardware-based isolation → a secure “enclave” inside the CPU where data is decrypted and processed. Even the system admin or cloud provider cannot see inside. ✨ Examples: 💥 Intel SGX 💥 AMD SEV 💥 AWS Nitro Enclaves → lets you isolate EC2 instances for secure key management, medical data processing, payment transactions, etc. 💥 Use case: A bank can run fraud detection models on sensitive financial data in the cloud without exposing it to AWS staff. 3. Confidential Computing Broader concept: combines TEEs, encrypted memory, and sometimes HE. Ensures that data remains protected throughout its lifecycle (rest, transit, use). ✨ Cloud examples: 💥 AWS Nitro Enclaves 💥 Azure Confidential Computing 💥 Google Confidential VMs 4. Secure Multi-Party Computation (MPC) Multiple parties compute a function jointly without revealing their private inputs. Often used in cryptocurrency custody, federated learning, and zero-knowledge proofs. 💥 Example: Banks collaboratively detect fraud patterns without sharing customer records. #learnwithswetha #encryption #datainuse #learning #dataprotection #privacy
-
Quantum computing won’t break all encryption — but it will break the asymmetric keys our digital trust relies on. The good news is that post-quantum algorithms are already available. AES-256 and other symmetric algorithms remain strong, even in a quantum world. But RSA, ECC, DH, ECDSA, and Ed25519? Those are at risk — and will need to be replaced with quantum-resistant algorithms. Here’s what organizations should be doing now: 🔹 Audit where asymmetric crypto is used 🔹 Verify cryptographic modules (OpenSSL v3.5 includes NIST PQC algorithms) 🔹 Identify data requiring 10+ years confidentiality 🔹 Ask vendors for their quantum-resistant roadmap 🔹 Add the quantum threat to your risk register 🔹 Track NIST PQC standardization progress Quantum risk isn’t about fear — it’s about preparation. Hi 👋 I’m Debra Baker, cybersecurity strategist (vCISO), offering compliance services in SOC 2, CMMC, ISO 27001, HIPAA, and StateRAMP — and author of A CISO Guide to Cyber Resilience, available on Amazon 👉 https://amzn.to/3Vt1g0o. 👉 Follow me and TrustedCISO; hit the 🔔 bell icon to stay resilient, stay ready, stay secure — because cyber resilience isn’t just strategy, it’s survival. 🔐
-
India just crossed a major milestone in the race for quantum-secure communication — and it's not science fiction anymore. DRDO & IIT Delhi have successfully demonstrated Quantum Entanglement-Based Free-Space Secure Communication — over 1 km using an optical link on campus. Here’s why these matters: 1) Entangled photons were used to create secure cryptographic keys 2) No optical fiber needed — it worked over free space. 3) Achieved ~240 bits/sec secure key rate. 4) Quantum Bit Error Rate was below 7%. So, what’s the big deal? 1) It proves that we can build secure communication systems without needing underground cables — perfect for difficult terrains, defense zones, or remote areas. 2) Even if someone tries to intercept the message, the quantum state changes — making the intrusion detectable. 3) It’s another step toward building the Quantum Internet in India. The work was led by Prof. Bhaskar Kanseri’s team at IIT Delhi and supported by DRDO under its “Centres of Excellence” initiative. #QuantumComputing #QuantumCommunication #DRDO #IITDelhi #QuantumIndia #QuantumSecurity #Photonics #Research #QuantumInternet
-
Canadian researchers have officially linked multiple cities through a quantum-entangled communication network — creating one of the world’s first large-scale quantum internet systems. Instead of relying on traditional encryption, this network uses entangled photons to distribute quantum keys. If anyone tries to intercept the signal, the quantum state collapses instantly, alerting both parties and rendering the stolen data useless. This gives the network a level of security that even supercomputers or future AI systems cannot break. The project uses a combination of fiber-optic links and satellite-supported quantum channels, allowing secure communication over long distances — from government agencies and financial institutions to scientific laboratories. This achievement signals the beginning of a new era in cybersecurity, one where hacks, leaks, and breaches become nearly impossible. Quantum internet isn’t about speed — it’s about rewriting the rules of trust and digital protection on a national scale. #QuantumInternet #CanadaTech #CyberSecurity #QuantumPhysics #FutureTechnology #engineering #physics