Quantum computing promises a revolution in science, but it also signals the end of current security standards. Here is why enterprises must transition to post-quantum cryptography before…
Gharun Lacy, Deputy Assistant Secretary for the Cyber and Technology Security Directorate at the Department of State, issued a challenge for cybersecurity defenders at CyberTalks, on Thursday, Feb. 20, 2026. (James Kim / EPNAC)
The interior of the IBM Quantum System Two is seen at IBM Thomas J. Watson Research Center on June 6, 2025 in Yorktown Heights, New York. A guide aims to help tech buyers navigate their switch to post-quantum encryption, but experts cautioned that most products and backend internet protocols have yet to be updated. (Photo by ANGELA WEISS / AFP) (Photo by ANGELA WEISS/AFP via Getty Images)
A guide aims to help tech buyers navigate their switch to post-quantum encryption, but experts cautioned that most products and backend internet protocols have yet to be…
The six-pillar document covers a lot of ground in a short space, and could be followed by an executive order implementing it, according to sources familiar with…
The Continuous Diagnostics and Mitigation program is oft-praised, but there are areas where it doesn’t yet excel, as a recent CISA emergency directive shows.
Sen. Marsha Blackburn did not provide a timeline for any formal rollout by the administration, and also pointed to her proposed bill with Michigan Sen. Gary Peters.
ntern Marc Sibaja looks at the IBM Quantum System Two at IBM Thomas J. Watson Research Center on June 6, 2025 in Yorktown Heights, New York. Technology veteran IBM on June 10 laid out a plan to have a “practical” quantum computer tackling big problems before the end of this decade. Current quantum computers are still experimental and face significant challenges, including high error rates. Companies like IBM, Google, and others are working to build more stable and scalable quantum systems. (Photo by ANGELA WEISS / AFP)