Cyber defenders fight back as quantum threat looms large

August 20, 2024
1 min read



TLDR: Battle begins to stop quantum computers smashing cyber defences

Key Points:

  • America has approved new post-quantum cryptography standards to help protect against malicious users of quantum computers.
  • Cybersecurity suppliers will now work on incorporating this technology into hardware, software, and applications.

An article in The Times discusses the urgent need for businesses to upgrade their cybersecurity systems in response to the advancing threat posed by quantum computers. The National Institute of Standards and Technology in the United States has approved three algorithms for new post-quantum cryptography standards after eight years of collaboration among cryptography experts worldwide. This approval marks the beginning of a new phase where cybersecurity suppliers will develop ways to integrate this technology into various systems, including hardware and software that are widely used by the public.

The US government has set a timeline for companies supplying the federal government to start protecting their systems between 2025 and 2030. The British National Cyber Security Centre has also acknowledged the importance of these standards in safeguarding critical systems against potential cyber threats. This move is crucial in the face of emerging technologies like quantum computers, which have the potential to break traditional encryption methods and compromise sensitive data.

Overall, the approval of new cryptography standards signals a proactive approach in addressing cybersecurity challenges posed by quantum computing advancements. Businesses and organizations are encouraged to prioritize the implementation of these standards to fortify their cyber defences and protect against malicious cyber attacks in the future.


Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives

Cyber insurance changes shape of security for good and bad

TLDR: Key Points: Cyber-insurance landscape is shifting to encourage greater cyber resiliency Rising costs of cyberattacks are prompting insurers to re-examine underwriting How Cyber-Insurance Shifts Affect the Security Landscape The article discusses