TNFL Trust Now Forge Later

Trust Now, Forge Later (TNFL) - The Overlooked Quantum Threat

Harvest vs. Forge - Twin Quantum Threats to Security What is "Trust Now,…


Vendor Quantum

Quantum Readiness Is Not (Just) a Vendor Problem

In the recent IBM's “Secure the Post-Quantum Future” report 62% of executives…


Quantum Readiness PQC Program Telecom

Quantum-Readiness / PQC Full Program Description (Telecom Example)

Introduction Within the cybersecurity community, there is significant…


Q-Day Deadline Set

Forget Q-Day Predictions - Regulators, Insurers, Investors, Clients Are Your New Quantum Clock

The Endless Q-Day Debate For years, cybersecurity experts have debated…


Crypto-Agility Marin's Law

Marin’s Law on Crypto-Agility: Adaptability Determines Survivability

Thesis: Migration time to safer cryptography is inversely proportional to an…


How to estimate q-day

How You, Too, Can Predict Q-Day (Without the Hype)

Introduction For three decades, Q-Day has been “just a few years away.” A…


Q-Day Quantum Computing Predictions

The Trouble with Quantum Computing and Q-Day Predictions

Introduction Quantum computing timelines are all over the map. Depending on…


CISO Quantum Readiness Budget Deck

Securing Quantum Readiness Budget Now

Introduction Nearly every CISO I speak with right now is either scoping a…


Risk-Driven Cryptographic Inventory

Risk-Driven Strategies for Quantum Readiness When Full Crypto Inventory Isn’t Feasible

Quantum computing threatens to break or weaken today’s cryptography, putting…


Quantum Threat Board C-Suite

What is the Quantum Threat? A Guide for C‑Suite Executives and Boards

Cybersecurity has been at or near the top of corporate risk lists for years.…


Privacy Preference Center