Harvest Now Decrypt Later HNDL

Harvest Now, Decrypt Later (HNDL) Risk

Introduction In the world of cybersecurity, there’s a ticking time bomb that…


Post Quantum Cryptography PQC Challenges

Post-Quantum Cryptography PQC Challenges

Introduction As the quantum threat approaches, the need to prepare our…


Quantum Resistance Enterprise Changes

Quantum Era Demands Changes to ALL Enterprise Systems

Introduction In my work with various clients, I frequently encounter a…


Bill of Materials BOM

Bills of Materials for Quantum Readiness: SBOM, CBOM, and Beyond

Introduction Quantum computing threat is forcing organizations to inventory…


NIST PQC Technical

Inside NIST’s PQC: Kyber, Dilithium, and SPHINCS+

Introduction The race to develop post-quantum cryptography (PQC) has…


Post Quantum Digital Signatures

The Future of Digital Signatures in a Post-Quantum World

What Are Digital Signatures and Why Do They Matter? Today’s Digital…


Cryptographically Relevant Quantum Computer CRQC

Cryptographically Relevant Quantum Computers (CRQCs)

Introduction Definition of CRQC CRQC vs Early-stage (NISQ) Devices Why…


Vendors Quantum Readiness

Engaging and Managing Vendors for Quantum Readiness

Understanding the Quantum Threat and Why It Matters Why Engage Vendors…


Toffoli Gate Quantum

The Toffoli Gate: The Unsung Workhorse in Quantum Codebreaking

Reversible Logic: Why Quantum Circuits Can’t Use a Standard AND Gate Meet…


Beyond PQC

Mitigating Quantum Threats Beyond PQC

Introduction Challenges and Limitations of PQC Alternative and…


Privacy Preference Center