
Sign up to save your podcasts
Or


Episode 4: The National Institute of Standards and Technology's (NIST) release of its new post-quantum cryptography standards last summer was the quiet start of a new chapter in cybersecurity. Now no longer something that can be filed away for future reference, post-quantum encryption has officially landed on the desks of cybersecurity leaders worldwide.
We wanted to explore what comes next, so we recruited some world-class experts to help get answers. This episode of Dark Reading Confidential digs the world of quantum computing from a cybersecurity practitioner's point of view -- with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University.
They give practical advice on how to manage the upgrade of post-quantum standards across an array of systems, and how to prioritize the most critical cryptography vulnerabilities inside your organization. From threat actors to regulators, the pressure to update to post-quantum standards is on. This episode of Dark Reading Confidential is focused on what to do about it.
Take a listen.
By InformaTechtarget5
33 ratings
Episode 4: The National Institute of Standards and Technology's (NIST) release of its new post-quantum cryptography standards last summer was the quiet start of a new chapter in cybersecurity. Now no longer something that can be filed away for future reference, post-quantum encryption has officially landed on the desks of cybersecurity leaders worldwide.
We wanted to explore what comes next, so we recruited some world-class experts to help get answers. This episode of Dark Reading Confidential digs the world of quantum computing from a cybersecurity practitioner's point of view -- with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University.
They give practical advice on how to manage the upgrade of post-quantum standards across an array of systems, and how to prioritize the most critical cryptography vulnerabilities inside your organization. From threat actors to regulators, the pressure to update to post-quantum standards is on. This episode of Dark Reading Confidential is focused on what to do about it.
Take a listen.

187 Listeners

2,004 Listeners

371 Listeners

374 Listeners

638 Listeners

1,021 Listeners

414 Listeners

8,016 Listeners

178 Listeners

314 Listeners

189 Listeners

74 Listeners

137 Listeners

46 Listeners

171 Listeners