-
Blog Post Sep 19, 2022
Today the world’s data is secured with technology that in some ways acts like a passport. Like passports, this technology – a public key infrastructure (PKI) digital certificate – contains identity information related to the holder. In the digital world, digital certificates act as a “passport” for humans and the machines (such as software, code, bots, IoT/OT, laptops, and devices) they use.
-
Blog Post Sep 12, 2022
Quantum computing’s arrival will cause a ripple effect touching every corner of the technological landscape. In general terms, quantum computers lean on quantum physics to run multiple processes simultaneously, allowing them to solve certain complex problems much more quickly than traditional computers can today.
-
Podcast Sep 12, 2022
Root Causes 241: Is China Outspending the West in Quantum Computing?
A December 2021 report suggests China as vastly outspending the West in quantum computing. We examine this claim and its implications.
-
Webinar Sep 08, 2022
Preparing for Post Quantum Security Webinar
Learn more about the 4 NIST winning algorithms, why cryptoagility matters, and the practical steps you can take to prepare for quantum-resistant encryption
-
Blog Post Sep 06, 2022
For nearly 50 years, public key infrastructure (PKI) has provided a secure cryptographic foundation for the world’s data. But in the next few years, quantum computers are destined to render the current cryptographic algorithms that secure devices and the people who use them obsolete.
-
Podcast Aug 29, 2022
Root Causes 239: Post-quantum Cryptography Candidate SIKE Defeated
NIST's round four post-quantum crypto candidate SIKE (Supersingular Isogeny Key Encapsulation) has been defeated and is now out of consideration.
-
Podcast Jul 27, 2022
Root Causes 235: What Is Lattice-based Cryptography?
The new NIST PQC algorithms focus on lattice-based encryption. We explain this cryptographic approach and why it fared so well in the NIST search.
-
Podcast Jul 13, 2022
Root Causes 233: CISA Recommendations for Post-Quantum Cryptography
The Cybersecurity and Infrastructure Security Agency has listed six key actions for IT to commence for post-quantum cryptography. We put them in context.
-
Podcast Jul 08, 2022
Root Causes 232: NIST Announces Its Post Quantum Crypto Selections
NIST has announced its winning algorithms for its post-quantum cryptography contest. We name describe them, why they were chosen, and next steps.
-
Podcast Apr 27, 2022
Root Causes 219: New Quantum Cryptography Legislation Introduced
Proposed legislation in the House of Representatives mandates that federal agencies begin preparation for new quantum resistant cryptographic algorithms.
-
Podcast Apr 09, 2021
Root Causes 160: Purpose-built Quantum Computers for Breaking RSA
A new paper describes how a purpose-built quantum computer could break RSA encryption in fewer qbits than commonly are thought necessary.
-
Blog Post Dec 23, 2020
A group of Sectigo’s senior leaders, including Bill Holtz (CEO), Tim Callan (Chief Compliance Officer), Edward Giaquinto (CIO), Jason Soroko (CTO of PKI), and Alan Grau (VP of IoT), met to discuss a few of the cybersecurity trends that have impacted us in 2020, and how those trends might evolve in 2021. Part two of that discussion is below, and touches on topics including security regulations, quantum computing, and the importance of certificate agility.