TECHNOLOGY > Key Areas > Quantum Computing


« Back to News

2024-05-21

The Key To Future-Proof Encryption

Quantum Computing & Public-Key Cryptography: Hardening network communications against current and future vulnerabilities.

2024-04-29

Facing The Quantum Challenge

The End Of Encryption: The potential of quantum computing is undeniable, but so is the threat it poses to our digital security. By Jason Soroko

2024-04-15

A Brief Introduction To Quantum Computing

Quantum Computing: Innovative technology is enabling individuals and companies to solve computational problems previously considered intractable.

2024-01-31

Quantum Computing: The Growing Threat Of SNDL

Store Now & Decrypt Later: Advances in Quantum computing mean that any encrypted data that's already been stolen can no longer be protected.

2023-09-14

CISA's Post-Quantum Cryptography Initiative

As quantum computing advances, it presents an increasing risk to widely used encryption methods. A new technology standard is needed.

2023-07-28

HSBC Using Quantum To Protect Against Cyber Threats

The major international bank is testing a quantum-secured network in London's financial centre, as it prepares for future security threats.

2023-05-26

Enabling Quantum-Safe Cryptography

End-To-End Solution: IBM has released a roadmap outlining the steps organisations can take to transition to quantum-safe cryptography.

2023-03-22

Britain Pledges To Invest £2.5bn In Quantum Computing

Ambitious National Plan For AI: "A world-leading quantum-enabled economy by 2033" with a £2.5bn research and innovation programme

2023-02-13

Quantum Computer Power Threatens Encryption

Quantum computers will completely transform data processing speeds and they can also be used by enemies for highly destructive modes of attack.

2023-01-03

Biden Signs Quantum Cyber Security Act

Q Day: The law is designed to secure US government systems & data against the fast approaching threat of quantum-enabled data breaches.

2022-09-23

Quantum Computing Raises As Many Problems As It Solves

Quantum computing poses both opportunities and risks to the cyber security environment and above all, a serious threat to encrypted communications.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Teneo

Teneo

Teneo is a Solutions Provider focused on reducing complexity. We combine leading technology with deep expertise to create new ideas on how to simplify IT operations.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Cybonet

Cybonet

Cybonet is committed to empowering organizations of all sizes with the tools and capabilities to detect and engage cyber security threats.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

Securonix

Securonix

Securonix delivers a next generation security analytics and operations management platform for the modern era of big data and advanced cyber threats.

PointWire

PointWire

PointWire offers a range of cybersecurity solutions and services including Penetration Testing on various levels, as well as Intrusion Detection and Prevention Systems.

Flotek

Flotek

Flotek is an IT & Comms service provider delivering SMEs with trusted, innovative and cost effective cloud technology, with confidence, clarity and clout.

Cloudbrink

Cloudbrink

Cloudbrink is purpose-built to deliver the industry’s highest performance connectivity to remote and hybrid workers, anywhere in the world.