Blogs & Podcasts

Blogs & Podcasts
Defending Encryption: Quantum XChange at Cisco Live Amsterdam
Defending Encryption: Quantum XChange at Cisco Live Amsterdam
Blogs & Podcasts
$1 Billion Investment Accelerates CRQC Timeline
$1 Billion Investment Accelerates CRQC Timeline
Blogs & Podcasts

Defending Encryption: Quantum XChange at Cisco Live Amsterdam

Defending Encryption: Quantum XChange at Cisco Live Amsterdam
Blogs & Podcasts

Securing the Future: What Happens When the Algorithm Breaks?

Securing the Future: What Happens When the Algorithm Breaks?
Blogs & Podcasts

Welcoming Tom Butta as Chief Commercial & Marketing Officer

Welcoming Tom Butta as Chief Commercial & Marketing Officer
Blogs & Podcasts

Post-Quantum Cryptography in 2026: What Infrastructure Leaders Need to Know

Post-Quantum Cryptography in 2026: What Infrastructure Leaders Need to Know
Blogs & Podcasts

Quantum and AI: Twin Threats to Data Security

Quantum and AI: Twin Threats to Data Security
Blogs & Podcasts

Nobel Prize Highlights Urgency of Post-Quantum Cryptography

Nobel Prize Highlights Urgency of Post-Quantum Cryptography
Blogs & Podcasts

$1 Billion Investment Accelerates CRQC Timeline

$1 Billion Investment Accelerates CRQC Timeline
Blogs & Podcasts

RFC 9370: Is It Enough?

RFC 9370: Is It Enough?
Blogs & Podcasts

Solving Multi-Protocol Compatibility Issues with Phio TX®

Solving Multi-Protocol Compatibility Issues with Phio TX®
Blogs & Podcasts

Recapping Cisco Live 2025: Preparing for the Post-Quantum Era

Recapping Cisco Live 2025: Preparing for the Post-Quantum Era
Blogs & Podcasts

Phio TX-EM: Embracing PQCs Just Got Easier

Phio TX-EM: Embracing PQCs Just Got Easier
Blogs & Podcasts

Post-Quantum Readiness in Risk Assessments

Post-Quantum Readiness in Risk Assessments
Blogs & Podcasts

Harvest Now, Decrypt Later: The Quantum Security Threat Hanging Over Today’s Data

Harvest Now, Decrypt Later: The Quantum Security Threat Hanging Over Today's Data
Blogs & Podcasts

2025 Verizon Data Breach Investigations Report: Preparing for the Next Frontier in Cybersecurity

2025 Verizon Data Breach Investigations Report: Preparing for the Next Frontier in Cybersecurity
Blogs & Podcasts

RSAC 2025 Recap

RSAC 2025 Recap
Blogs & Podcasts

Strategic Product Transition: Our Commitment to Innovation and Partnership

Strategic Product Transition: Our Commitment to Innovation and Partnership
Blogs & Podcasts, Featured

Recommended Quantum Talks at RSA 2025

Recommended Quantum Talks at RSA 2025
Blogs & Podcasts, Featured

Healthcare to Benefit Greatly from Quantum Technologies, But Ill Prepared

Healthcare to Benefit Greatly from Quantum Technologies, But Ill Prepared
Blogs & Podcasts, Featured

NIST Releases Backup PQC Algorithm: Reinforces Phio TX Use Case

NIST Releases Backup PQC Algorithm: Reinforces Phio TX Use Case
Blogs & Podcasts, Featured

Microsoft’s Majorana 1: Quantum Computers are Years Not Decades Away

Microsoft’s Majorana 1: Quantum Computers are Years Not Decades Away
Blogs & Podcasts, Featured

FS-ISAC Issues New Guidance to Help the Payment Card Industry Mitigate Risks of Quantum Computing

FS-ISAC Issues New Guidance to Help the Payment Card Industry Mitigate Risks of Quantum Computing
Blogs & Podcasts, Featured

The United Nations International Year of Quantum

The United Nations International Year of Quantum
Blogs & Podcasts, Featured

11th Hour Executive Order to Strengthen U.S. Cyber Practices Buries Quantum Headline: PQC is Now, Not 2035

11th Hour Executive Order to Strengthen U.S. Cyber Practices Buries Quantum Headline: PQC is Now, Not 2035
Blogs & Podcasts

What Is the Impact of Quantum Computing on Cybersecurity?

What Is the Impact of Quantum Computing on Cybersecurity?
Blogs & Podcasts, Featured

Salt Typhoon: A Wake-Up Call for Encryption Management & Control

Salt Typhoon: A Wake-Up Call for Encryption Management & Control
Blogs & Podcasts, Featured

Google’s Willow Chip Speeds Post-Quantum Migration Timelines: The Time to Act is Now

Google’s Willow Chip Speeds Post-Quantum Migration Timelines: The Time to Act is Now
Blogs & Podcasts, Featured

2025 Outlook: Navigating the Quantum Revolution in 2025 and Beyond

2025 Outlook: Navigating the Quantum Revolution in 2025 and Beyond
Blogs & Podcasts

Going Beyond PCI DSS 4.0 to Redefine Cryptographic Compliance in Finance

Going Beyond PCI DSS 4.0 to Redefine Cryptographic Compliance in Finance
Blogs & Podcasts

What Happens If the PQCs Fail? The Continued Case for Crypto Diversification

What Happens If the PQCs Fail? The Continued Case for Crypto Diversification
Blogs & Podcasts

The NIST PQC Standard: What Enterprises Need to Know

The NIST PQC Standard: What Enterprises Need to Know
Blogs & Podcasts

How Quantum Xchange Solves for the PQC Adoption Challenges Outlined by NIST

How Quantum Xchange Solves for the PQC Adoption Challenges Outlined by NIST
Blogs & Podcasts

NIST Updates PQC Guidance: Cryptographic Discovery Using CipherInsights from Quantum Xchange

NIST Updates PQC Guidance: Cryptographic Discovery Using CipherInsights from Quantum Xchange
Blogs & Podcasts

GSMA Urges Membership to Define Guidelines and Processes for PQC Transition

GSMA Urges Membership to Define Guidelines and Processes for PQC Transition
Blogs & Podcasts

How to Avoid KyberSlash and Other Vulnerabilities Like It

How to Avoid KyberSlash and Other Vulnerabilities Like It
Blogs & Podcasts

Quantum Technology’s Impact on the Metaverse

Quantum Technology’s Impact on the Metaverse
Blogs & Podcasts

2024 Verizon Data Breach Investigations Report: Third-Party Risk & CipherInsights

2024 Verizon Data Breach Investigations Report: Third-Party Risk & CipherInsights
Blogs & Podcasts

Why the Java ECDSA Bug Is Illustrative of a Crypto Monoculture That Must Change: The Case for Crypto Diversification

Why the Java ECDSA Bug Is Illustrative of a Crypto Monoculture That Must Change: The Case for Crypto Diversification
Blogs & Podcasts, Single Points of Failure Series

Single Points of Failure in Cryptography #3: Weak or Low Entropy

Single Points of Failure in Cryptography #3: Weak or Low Entropy
Blogs & Podcasts, Single Points of Failure Series

Single Points of Failure in Cryptography, Post #6: Bugs in Software

Single Points of Failure in Cryptography, Post #6: Bugs in Software
Blogs & Podcasts, Single Points of Failure Series

Single Points of Failure in Cryptography #5: The Human Factor

Single Points of Failure in Cryptography #5: The Human Factor
Blogs & Podcasts, Single Points of Failure Series

Single Points of Failure in Cryptography #4: Password Strength

Single Points of Failure in Cryptography #4: Password Strength
Blogs & Podcasts, Single Points of Failure Series

Single Points of Failure Debut Post: Public Handshake & Key Derivation

Single Points of Failure Debut Post: Public Handshake & Key Derivation
Blogs & Podcasts, Single Points of Failure Series

Single Points of Failure in Cryptography #2: Asymmetric Encryption

Single Points of Failure in Cryptography #2: Asymmetric Encryption
Blogs & Podcasts, Our Contribution to The White House PQC Roundtable

Our Contribution to The White House PQC Roundtable – Part 1: When (and When Not) to Use Hybrid Encryption

Our Contribution to The White House PQC Roundtable – Part 1: When (and When Not) to Use Hybrid Encryption
Blogs & Podcasts, Our Contribution to The White House PQC Roundtable

Our Contribution to The White House PQC Roundtable – Part 3: The Cost of Implementing Quantum Cryptography + Enhancing Crypto-Agility

Our Contribution to The White House PQC Roundtable – Part 3: The Cost of Implementing Quantum Cryptography + Enhancing Crypto-Agility
Blogs & Podcasts, Our Contribution to The White House PQC Roundtable

Our Contribution to The White House PQC Roundtable – Part 2: Preparing for Post-Quantum Cryptography

Our Contribution to The White House PQC Roundtable – Part 2: Preparing for Post-Quantum Cryptography
Blogs & Podcasts

Fortinet’s Next-Gen Firewall Now Supports the ETSI Quantum Key Distribution (EQKD) Protocol

Fortinet’s Next-Gen Firewall Now Supports the ETSI Quantum Key Distribution (EQKD) Protocol
Blogs & Podcasts

Meeting Federal Mandates: From Quantum Safe to Zero Trust

Meeting Federal Mandates: From Quantum Safe to Zero Trust
Blogs & Podcasts

Attack on Municipal Water Authority Sheds Light on the Importance of Future-Proofing Critical Infrastructure

Attack on Municipal Water Authority Sheds Light on the Importance of Future-Proofing Critical Infrastructure
Blogs & Podcasts

Three-Pronged Strategy for a Successful Post-Quantum Migration: Pillar #3 – Advantage

Three-Pronged Strategy for a Successful Post-Quantum Migration: Pillar #3 – Advantage
Blogs & Podcasts

Calculating Damages of a Quantum-Enabled Attack on US Financial Systems

Calculating Damages of a Quantum-Enabled Attack on US Financial Systems
Blogs & Podcasts

Invest in a Resilient Digital Future. Do Your Part, #BeQuantumSafe

Invest in a Resilient Digital Future. Do Your Part, #BeQuantumSafe
Blogs & Podcasts

Three-Pronged Strategy for a Successful Post-Quantum Migration: Pillar #2 – Anticipation

Three-Pronged Strategy for a Successful Post-Quantum Migration: Pillar #2 – Anticipation
Blogs & Podcasts

Three-Pronged Strategy for a Successful Post-Quantum Migration: Pillar #1- Awareness

Three-Pronged Strategy for a Successful Post-Quantum Migration: Pillar #1- Awareness
Blogs & Podcasts

Break the Crypto Monoculture, Don’t Fall Victim to It

Break the Crypto Monoculture, Don’t Fall Victim to It
Blogs & Podcasts

New Year, New Security Priorities – Get Quantum Fit in 2023

New Year, New Security Priorities – Get Quantum Fit in 2023
Blogs & Podcasts

Three Predictions for 2023

Three Predictions for 2023
Blogs & Podcasts

Phio TX Awarded Patent for Secure Out-of-Band Symmetric Encryption Key Delivery

Phio TX Awarded Patent for Secure Out-of-Band Symmetric Encryption Key Delivery
Blogs & Podcasts

Cure Ransomware Before the Attack, Not During It

Cure Ransomware Before the Attack, Not During It
Blogs & Podcasts

Another NIST PQC Finalist Bites the Dust – The Case for Crypto-Diversification Strengthened

Another NIST PQC Finalist Bites the Dust – The Case for Crypto-Diversification Strengthened
Blogs & Podcasts

Federal Quantum Mandates Abound – States Take Notice at NYS 24th Annual Cybersecurity Conference

Federal Quantum Mandates Abound – States Take Notice at NYS 24th Annual Cybersecurity Conference
Blogs & Podcasts

A Brief Guide to Quantum Encryption vs. Post-Quantum Cryptography [INFOGRAPHIC]

A Brief Guide to Quantum Encryption vs. Post-Quantum Cryptography [INFOGRAPHIC]
Blogs & Podcasts

Quantum Communications in Real-World Applications

Quantum Communications in Real-World Applications
Blogs & Podcasts

What are Quantum Networks and How Do They Work?

What are Quantum Networks and How Do They Work?
Blogs & Podcasts, Featured

World Quantum Day: Where the Quantum Revolution Stands

World Quantum Day: Where the Quantum Revolution Stands
Blogs & Podcasts, Featured

The Fifth Domain Takes a Quantum Leap Forward – Why Ongoing Cyber Warfare Could Spark a Quantum Arms Race

The Fifth Domain Takes a Quantum Leap Forward – Why Ongoing Cyber Warfare Could Spark a Quantum Arms Race
Blogs & Podcasts

Government Closes in on Quantum-Resistant Encryption Standards – Plan for Failure with Quantum-in-Depth Approach

Government Closes in on Quantum-Resistant Encryption Standards – Plan for Failure with Quantum-in-Depth Approach
Blogs & Podcasts, Featured

Why BCG’s “Ensuring Online Security in a Quantum Future” is a Must Read for Every Enterprise

Why BCG’s “Ensuring Online Security in a Quantum Future” is a Must Read for Every Enterprise
Blogs & Podcasts, Featured

A Wake-Up Call for Critical Infrastructure: Lessons from the Florida Water Supply Attack

A Wake-Up Call for Critical Infrastructure: Lessons from the Florida Water Supply Attack
Blogs & Podcasts, Featured

Love Your Data

Love Your Data
Blogs & Podcasts

Quantum Xchange Receives FIPS 140-2 Validation: Certificate #3754 and #3569

Quantum Xchange Receives FIPS 140-2 Validation: Certificate #3754 and #3569
Blogs & Podcasts

Meet Our New CEO: Eddy Zervigon

Meet Our New CEO: Eddy Zervigon
Blogs & Podcasts

NIST Announces PQC Selection Round, Acknowledges Future Consideration of New Approaches

NIST Announces PQC Selection Round, Acknowledges Future Consideration of New Approaches
Blogs & Podcasts

Phio TX Inventor Shares His Favorite Features in Version 2.0

Phio TX Inventor Shares His Favorite Features in Version 2.0
Blogs & Podcasts

The Race for a COVID-19 Vaccine: Another Opportunity for Chinese IP Theft, Another Reason to Protect Our Critical Data with Quantum Keys

The Race for a COVID-19 Vaccine: Another Opportunity for Chinese IP Theft, Another Reason to Protect Our Critical Data with Quantum Keys
Blogs & Podcasts

Proposed Presidential FY2021 Budget Validates Importance of Investing in Quantum Technology

Proposed Presidential FY2021 Budget Validates Importance of Investing in Quantum Technology
Blogs & Podcasts

There’s No Time to Wait: Security Pros at RSA 2020 Recognize the Urgency of Quantum Readiness But Orgs Fail to Act

There’s No Time to Wait: Security Pros at RSA 2020 Recognize the Urgency of Quantum Readiness But Orgs Fail to Act
Blogs & Podcasts

What direction will the Internet take in the next 50 years

What direction will the Internet take in the next 50 years
Blogs & Podcasts

Achieving Quantum Readiness with Phio TX

Achieving Quantum Readiness with Phio TX
Blogs & Podcasts

Colonial Pipeline Attack in the Quantum Era? An Unthinkable, Yet Very Real, Scenario that Requires Action Today

Colonial Pipeline Attack in the Quantum Era? An Unthinkable, Yet Very Real, Scenario that Requires Action Today
Blogs & Podcasts

Countdown to Encryption – Only 120 Days Remain for Meeting the White House Executive Order on Encrypting Data in Motion

Countdown to Encryption – Only 120 Days Remain for Meeting the White House Executive Order on Encrypting Data in Motion
Blogs & Podcasts

The Case for Out-of-Band Key Delivery in Energy’s Critical Infrastructure Protection Plan

The Case for Out-of-Band Key Delivery in Energy’s Critical Infrastructure Protection Plan
Blogs & Podcasts

Quantum-Safe VPNs are Gaining Momentum and Making Headlines

Quantum-Safe VPNs are Gaining Momentum and Making Headlines
Blogs & Podcasts

True Crypto Agility Revisited – Phio TX Bragging Rights

True Crypto Agility Revisited – Phio TX Bragging Rights
Blogs & Podcasts

“Act Now” Says DHS/NIST and CSA – Get a Jump on Post-Quantum Planning & Execution

“Act Now” Says DHS/NIST and CSA – Get a Jump on Post-Quantum Planning & Execution
Blogs & Podcasts

The Role of Quantum Security and its Impact on the Tech Trends Shaping the Next Decade

The Role of Quantum Security and its Impact on the Tech Trends Shaping the Next Decade
Blogs & Podcasts

Public Key Encryption Dead Before 50?

Public Key Encryption Dead Before 50?
Blogs & Podcasts

Booz Allen Report: China May Steal Encrypted Government Data Now to Decrypt with Quantum Computers Later

Booz Allen Report: China May Steal Encrypted Government Data Now to Decrypt with Quantum Computers Later
Blogs & Podcasts

2022’s Top 5 Cybersecurity Trends with a Quantum Twist

2022’s Top 5 Cybersecurity Trends with a Quantum Twist
Blogs & Podcasts

NSM-8: Government Mandates Quantum Resistant Cryptography for Protecting Federal Networks

NSM-8: Government Mandates Quantum Resistant Cryptography for Protecting Federal Networks
Blogs & Podcasts, Featured

Love Your Data for the Long Haul

Love Your Data for the Long Haul
Blogs & Podcasts

Starlink Signal Jamming Signals a Cybersecurity Wake-up Call: Space is at Risk

Starlink Signal Jamming Signals a Cybersecurity Wake-up Call: Space is at Risk
Blogs & Podcasts

How Close Are We to a Commercial Quantum Computer?

How Close Are We to a Commercial Quantum Computer?
Blogs & Podcasts

ETSI QKD – The Little-Known Protocol with Big Security Implications

ETSI QKD – The Little-Known Protocol with Big Security Implications
We’re sorry, there aren’t any posts that match what you’re looking for.
Try another a different filter or reset to see our latest posts.

Load Load 

more more

See Phio TX in Action

See how Phio TX can protect your critical data-in-motion today and in the post-quantum world.

See See 

a

demo demo

grainy-bg-blue