CISO Quantum Readiness Budget Deck

Securing Quantum Readiness Budget Now

Introduction Nearly every CISO I speak with right now is either scoping a…


AI Governance Board NED

Board AI Governance and Oversight

Not long ago, I sat in a board meeting where the conversation turned to a new…


Risk-Driven Cryptographic Inventory

Risk-Driven Strategies for Quantum Readiness When Full Crypto Inventory Isn’t Feasible

Quantum computing threatens to break or weaken today’s cryptography, putting…


Quantum Threat Board C-Suite

What is the Quantum Threat? A Guide for C‑Suite Executives and Boards

Cybersecurity has been at or near the top of corporate risk lists for years.…


Quantum CISO Budget

How CISOs Can Use Quantum Readiness to Secure Bigger Budgets (and Fix Today’s Problems)

Introduction Talking with the CISOs in my network, I keep hearing the same…


CRQC Readiness Benchmark

CRQC Readiness Benchmark - Benchmarking Quantum Computers on the Path to Breaking RSA-2048

Quantum computing is racing toward cryptographically relevant quantum…


AI Quantum Encryption

Why AI Cannot Break Modern Encryption

I spend my days helping boards and engineering teams get quantum-ready.…


Q-Day Y2Q RSA 2048 Cracked Quantum 2030

Q-Day Revisited - RSA-2048 Broken by 2030: Detailed Analysis

Introduction It’s time to mark a controversial date on the calendar: 2030 is…


PQC Cryptographic Inventory

Cryptographic Inventory Vendors and Methodologies

A growing number of tools – from large vendors to niche startups and…


Privacy Preference Center