Quantum Risk: The Coming Cryptography Reckoning
Introduction In a secure data center somewhere, an adversary is quietly…
Cryptographic Stack in Modern Interbank Payment Systems
Preface For years I’ve been knee‑deep in cryptographic inventories - pulling…
Post-Quantum Cryptography (PQC) and Network Connectivity: Challenges and Impacts
[Updated in July 2025] Post-Quantum Cryptography (PQC) promises future-proof…
What Will Really Happen Once Q-Day Arrives – When Our Current Cryptography Is Broken?
Introduction: The Dawn of Q-Day (or Y2Q) vs. the Y2K Mythos As the world…
Q-Day Predictions: Anticipating the Arrival of CRQC
Introduction There is a tremendous amount of hype about quantum computing…
Quantum Readiness for Mission-Critical Communications (MCC)
Introduction to MCC and Quantum Threats Mission-critical communications…
Harvest Now, Decrypt Later (HNDL) Risk
Introduction In the world of cybersecurity, there’s a ticking time bomb that…
Post-Quantum Cryptography PQC Challenges
Introduction As the quantum threat approaches, the need to prepare our…
Quantum Era Demands Changes to ALL Enterprise Systems
Introduction In my work with various clients, I frequently encounter a…
Bills of Materials for Quantum Readiness: SBOM, CBOM, and Beyond
Introduction Quantum computing threat is forcing organizations to inventory…









