There has been a lot of noise this past week on how financial institutions are taking advantage of #quantumcomputing which also means a new era of software and system security threats such as "harvest now, decrypt later". Here are some suggestions on CIO, CTOs, Developers and Testers and Quality Assurance, Compliance teams can prepare and safeguard from the risks associated with Quantum Computing: https://lnkd.in/gB7Swc3N Inflectra SpiraPlan - Enterprise Agile Program Management SpiraTeam - Application Lifecycle Management SpiraTest - Test & Requirements Management #ai #AWS Adam Sandman Kendra S. Audrey Marcum Jessica Moore Richard Baucom Dr. Sriram Rajagopalan
How to prepare for quantum computing security threats
More Relevant Posts
-
🚀 Introducing IBM Guardium Cryptography Manager: the next frontier in cryptographic defense 🚀 https://lnkd.in/e46m9KWS In today’s accelerating threat landscape — as quantum computing transitions from theory to reality — we’re facing a moment of reckoning for cryptography. Conventional algorithms that guard critical data may soon become vulnerable, and many organizations remain underprepared. That’s why we are excited to unveil IBM Guardium Cryptography Manager, a unified, AI-powered solution designed for the quantum age. It empowers enterprises with: 🔐 Quantum-safe readiness & crypto-agility: Bridge today’s cryptographic posture with emerging post-quantum algorithms. Guardium Cryptography Manager helps you continuously evolve, adapt, and migrate as standards mature. 🔐 Cryptography posture management: Gain full visibility into cryptographic assets, dependencies, and risk scoring. Audit-ready reporting and mapping across your environment help you spot gaps and act decisively to meet regulatory compaliances. 🔐 Centralized lifecycle management: Manage certificates, keys, and cryptographic objects across hybrid clouds from a single pane of glass — reducing operational complexity and silos. 🔐 Remediation & mitigation workflows: AI-guided automation helps you prioritize and remediate weak or unsupported crypto objects, accelerating your path to resilience. 🔐 Transparent database encryption (agentless): Detect unencrypted or partially encrypted database instances automatically and initiate remediation using the databases’ native encryption capabilities — all without deploying agents. Guardium Cryptography Manager is built to help organizations take control of cryptographic risk in the quantum era. It is part of IBM’s vision for quantum-safe, data-centric security and is available now. Let’s start the conversation: > What’s your organization’s maturity level when it comes to crypto-agility? > Are you confident your existing cryptography will survive the quantum leap? Proud of IBM leadership and talented team behind delivering this amazing solution to address our enterprise clients’ cryptography management needs today and for tomorrow: Suja Viswesan Vishal Kamat Amy Wong Sridhar Muppidi Yogendra Soni Puneet Sharma Prashant Mestri Chaitanya Challa Sridhar Narayanan Ravi Simha Reddy Vinaya Patil Tim Richer Kiran Subba Rao Hannah C. Ivana Pham Barbara Saltzman Nancy M. Milo Soriano Gregory Hess, Ian Wight Albert Puah Liher Elgezabal Matthew Krull Bob O'Connor Mike Kehoe Ajay Cherian Ray Harishankar Walid Rjaibi, PhD, CISSP, Alessandro Curioni Marc Ph. Stoecklin Michael Osborne Gregg Barrow, Antti Ropponen Jennifer Kady Dinesh Nirmal #IBM #Guardium #DataSecurity #QuantumSafe #CryptoAgility #PostQuantumCryptography #Encryption #SecurityLeadership #IBMSecurity #Cybersecurity
To view or add a comment, sign in
-
Exciting news from TechXchange! IBM just unveiled the IBM Guardium Cryptography Manager, an innovative, AI-driven solution designed to safeguard sensitive data, reduce risks, and pave the way for quantum-resilience with its crypto-agility feature. Learn more about this cutting-edge development: [Link to the announcement](https://lnkd.in/e4us7gR7) #TechXchange #IBM #DataSecurity #Innovation
To view or add a comment, sign in
-
IBM’s new Guardium Cryptography Manager empowers enterprises to take control of their cryptographic assets and prepare for the post-quantum era. #IBM #DataSecurity #QuantumSafe
🚀 Exciting News from IBM Data Security !! I’m thrilled to announce the arrival of IBM Guardium Cryptography Manager — a game-changing solution designed to help organizations take control of their cryptographic posture in the quantum era. Why it matters? With quantum computing on the horizon, traditional encryption is at risk. Guardium Cryptography Manager empowers enterprises to: ✅ Discover and inventory cryptographic assets ✅ Detect shadow or outdated cryptography ✅ Automate certificate & key lifecycle management ✅ Assess post-quantum cryptography (PQC) readiness ✅ Remediate vulnerabilities with integrated workflows ✅ Use encryption to protect sensitive data ✅ Achieve crypto-agility and compliance at scale 📊⚙️ 🌐 Built on IBM’s quantum-safe vision, this unified platform bridges visibility, encryption, and risk management — helping businesses stay ahead of evolving threats. 🔗 Learn more and explore the future of cryptographic resilience: IBM Guardium Cryptography Manager https://lnkd.in/gzU6jwHa Kudos to our amazing product team which brought his new offering at lightning speed !! Chaitanya Challa Vishal Kamat Prashant Mestri Yogendra Soni Sridhar Narayanan Ravi Simha Reddy Vinaya Patil Ian Wight Albert Puah Gaurav Chhiber Roshan Royan, CISSP Tushar Haralkar Sourabh Mallick Jeanie Tan Chee Kin Ng Eric Wong Brett Brouwer Siddhesh Naik Anothai Wettayakorn ROY KOSASIH Khang Nguyen, PhD. #DataSecurity #QuantumSafe #CryptoAgility #IBMGuardium #CyberResilience #AIandSecurity #PostQuantum #SecurityLeadership #IBM
To view or add a comment, sign in
-
Practical Information Security Tradeoffs: choose the right primitive for immediate value This post explores techniques and tradeoffs (with runnable benchmarks) when it comes to file confidentiality, integrity and accessibility. A practical look at confidentiality, integrity, and availability benchmarks “There’s no such thing as 100% security.” There is always a tradeoff between Confidentiality, Integrity and Availability when it comes to data. When it comes to files in production, always choose the tool that meets the risk profile for them. Do you need extremely fast checks to see if the files were modified? Or do you need cryptographic strength integrity checks for anti-tampering? You care more about the confidentiality of the files? Or maybe a combination of all three variables. Problem: teams often pick the “strongest” crypto (SHA-512, longest key lengths, slow checks) or the “simplest” fastest check without matching risk. That leads to either over-investment (high infra cost), under-operated complexity, or false confidence. Goal: show when to use SHA-512, AES-GCM, ChaCha20-Poly1305, and a fast non-cryptographic hash (Murmur) for real tasks: availability checks, tamper detection, and encryption. Provide 4 different approaches and benchmark them in two programming languages Haskell and Rust. Link to full the full blog post (approx 10 min read): https://lnkd.in/dF9EhZAv
To view or add a comment, sign in
-
🚨𝗦𝗲𝗰𝘂𝗿𝗲 𝗯𝘆 𝗗𝗲𝘀𝗶𝗴𝗻 - 𝗘𝘅𝗲𝗰𝘂𝘁𝗶𝗼𝗻 𝗮𝗻𝗱 𝗙𝗶𝗹𝗲 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 𝗔𝘁𝘁𝗮𝗰𝗸 𝗣𝗮𝘁𝗵𝘀: File upload bypass, command injection, race conditions, token theft, path traversal, metadata injection. 𝗗𝗲𝗳𝗲𝗻𝘀𝗲𝘀: Strict MIME + magic-byte checks, isolate uploads, sanitize paths, enforce least privilege, rotate tokens, sanitize metadata, and secure file operations. 𝗧𝗮𝗸𝗲𝗮𝘄𝗮𝘆: A single poorly validated upload can cascade into a full cloud breach, eliminate execution paths, treat user files as hostile, and enforce defense in depth around storage, processing, and credentials. Credits to DevSecOps Guides for Execution and File Management Follow House of SOC for more SOC related content.
To view or add a comment, sign in
-
🚨The Problem Nobody Wants to Discuss 🚨 Last week, during a TPRM assessment, I asked a vendor: "What's your quantum readiness plan?" Response: "We'll upgrade when quantum computers are commercially available." That's like installing sprinklers after the fire insurance claim. **Here's What's Actually Happening: Nation-state actors and organized crime groups are executing "harvest now, decrypt later" attacks RIGHT NOW. They're stockpiling encrypted data >> M&A contracts, IP, health records, financial transactions—betting on quantum decryption within 5-10 years. Your RSA-2048 and ECC-256 encryption? Time-stamped expiration dates. **The Uncomfortable Math:** - NIST published Post-Quantum Cryptography standards in August 2024 (ML-KEM, ML-DSA, SLH-DSA) - Data with 10+ year confidentiality requirements = already at risk - Most enterprises haven't even inventoried their cryptographic assets **Your 90-Day Action Framework: 1️⃣ Crypto Asset Discovery → Map every certificate, key, algorithm, and library across your infrastructure. If you can't inventory it, you can't protect it. 2️⃣ Data Lifetime Assessment → Tag assets by confidentiality period. Patient records, trade secrets, government contracts—these need PQC migration NOW, not 2030. 3️⃣ Crypto Agility Architecture → Stop hardcoding algorithms. Build abstraction layers that let you swap cryptographic libraries without rewriting applications. 4️⃣ Vendor Pressure → Add PQC migration timelines to TPRM questionnaires. Your supply chain's quantum readiness = your quantum readiness. 5️⃣ Hybrid Implementation → Start with hybrid classical+PQC modes at TLS endpoints. Test performance, measure overhead, fail safely. **The Reality Check:** We're treating quantum like Y2K when it's actually more like ransomware in 2015. By the time it's a "mainstream concern," your 2025 data is already compromised. Security isn't about responding to threats. It's about seeing them before they become incidents. 🔐 Be honest: Does your organization have a crypto inventory, let alone a PQC roadmap? Drop a 🟢 if you've started mapping cryptographic assets Drop a 🔴 if quantum is still "future state planning" Let's see where the industry really stands. No judgment, just data. P.S. If you're leading enterprise security transformation and want to benchmark PQC pilot approaches, my DMs are open. We're figuring this out together, not alone.
To view or add a comment, sign in
-
-
🔒 Exploring Lattice Cryptography & Why GGH Fails 🔒 Recently, I dove into lattice-based cryptography — a fascinating field that underpins many post-quantum encryption schemes. Two core problems define its security: Shortest Vector Problem (SVP): Find the shortest vector in a lattice. Closest Vector Problem (CVP): Given a target point, find the closest lattice vector. One of the earliest lattice schemes, GGH encryption, works like this: Alice has a private “good” basis (nearly perpendicular vectors) and publishes a public “bad” basis (skewed vectors). Bob encodes a message by picking lattice coordinates in the public basis, adds a small error, and sends the ciphertext to Alice. Alice decrypts by solving the closest vector problem using her private basis. ✅ Sounds secure in theory — but in practice, GGH is breakable: LLL / BKZ basis reduction: Attackers can transform the public “bad” basis into a nearly orthogonal one. Babai’s nearest-plane algorithm: With a reduced basis, the closest lattice point (the original message) is easily recovered. Embedding trick (CVP → SVP): CVP can be converted to a shortest vector problem in a slightly higher-dimensional lattice, allowing attackers to use SVP heuristics. 💡 Key Insight: A “bad” public basis still generates the same lattice. Modern lattice reduction algorithms can often reconstruct enough of the private structure to decode messages — which is why GGH is considered insecure today. Tiny example in 2D: Private basis: [[7,1],[1,6]][ [7,1],[1,6] ][[7,1],[1,6]] Public basis: [[7,15],[1,8]][ [7,15],[1,8] ][[7,15],[1,8]] Encrypt message [1,2][1,2][1,2] with small error → ciphertext [38,16][38,16][38,16] LLL reduces the public basis back to nearly the private one, Babai’s rounding recovers the message effortlessly. ✨ Takeaway: Lattice cryptography is powerful, but parameter choice and structure matter. Modern schemes like LWE and NTRU fix these weaknesses and are the foundation for post-quantum security.
To view or add a comment, sign in
-
-
IBM Unveils AI-Driven Cryptography Manager To Tackle Quantum Data Risks IBM has launched Guardium Cryptography Manager, an AI-powered system to help enterprises manage encryption and prepare for security risks posed by future quantum computers. The platform provides centralized visibility, lifecycle management, and automated remediation for cryptographic keys and certificates across hybrid and multi-cloud environments. Built on IBM’s quantum-safe security strategy, the new system supports crypto-agility by linking current encryption management with future post-quantum cryptography standards. https://lnkd.in/e7GvvJ33
To view or add a comment, sign in
-
Post-Quantum Cryptography: From ISM Controls to a Transition Plan The September ISM release from ASD added new controls: ✅ ISM-2073: Develop and maintain a post-quantum cryptography (PQC) transition plan. ✅ ISM-1917: Ensure new cryptographic equipment, applications, and libraries intended for use beyond 2030 support ASD-approved PQC algorithms (ML-DSA-87, ML-KEM-1024, SHA-384, SHA-512, AES-256). The message is clear: start planning now. While no cryptographically relevant quantum computer (CRQC) exists today, adversaries are already using “harvest now, decrypt later” tactics. How to Structure a PQC Transition Plan ASD’s guidance, reinforced by ETSI’s QSC Framework and NIST/CISA/NSA’s Quantum Readiness guide, recommends a structured approach: 1️⃣ Discover & Inventory: Identify where cryptography is used. Focus on asymmetric algorithms (RSA, ECC, DH, ECDSA) — all vulnerable to Shor’s algorithm. Catalogue apps, infra, APIs, vendors. 2️⃣ Assess & Prioritise: Which systems handle sensitive, long-lifecycle data? Which will still be in use beyond 2030? Prioritise high-value, high-risk systems. 3️⃣ Design a Roadmap: 2025–27: Build cryptographic agility. 2027–29: Phase in ASD-approved PQC algorithms. 2030: Full transition with PQC by default. 4️⃣ Implement & Test: Deploy hybrid models cautiously. Test interoperability and validate performance impacts. 5️⃣ Communicate & Govern: Build executive awareness, embed PQC in procurement, engage vendors early. 6️⃣ Monitor & Adapt: Stay aligned with ASD, ETSI, NIST standards. Maintain a living PQC plan, reviewed annually. Global Resources - Australia (ASD): Planning for Post-Quantum Cryptography - https://lnkd.in/gmhfWmaH - Europe (ETSI): Quantum-Safe Cryptography Framework - https://lnkd.in/gWdxva9A - US (NIST, CISA, NSA): Quantum Readiness: Migration to PQC - https://lnkd.in/gN3Kfg2X AssurePoint Pty Ltd’s View PQC transition isn’t a compliance checkbox — it’s about future-proofing assurance. The leaders will: Treat cryptographic agility as core. Embed PQC into strategy and procurement. Use the transition to strengthen governance, visibility, and resilience. Quantum is coming. The deadline is 2030. The time to start is now. #ISM #PSPF #CyberAssurance #Quantum #PQC #AssurePoint
To view or add a comment, sign in
-
Quantum computing based attacks on cryptography systems are coming, it's just a matter of time. Encryption gets the urgency, but signatures and PKI bring complexity. Plan certificate and key management changes now even if your risk window feels longer. Hybrid rollouts give safety to critical functions during the transition to Post-Quantum systems. https://lnkd.in/gjAzBdAd #PQC #KeyManagement #PKI #RiskManagement #CISO
To view or add a comment, sign in
More from this author
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development