IT OT Asset Discovery Challenges

The Challenge of IT and OT Asset Discovery

Introduction Why Complete Asset Inventory Is Essential The Ever-Expanding…


BHT PQC Quantum

Brassard–Høyer–Tapp (BHT) Quantum Collision Algorithm and Post-Quantum Security

Introduction and Overview The BHT Algorithm: Quantum Collision-Finding How…


Shor's Algorithm Quantum

Shor’s Algorithm: A Quantum Threat to Modern Cryptography

Introduction Background on RSA Encryption How RSA works (conceptually) Why…


Grover's Algorithm

Grover’s Algorithm and Its Impact on Cybersecurity

Introduction to Grover’s Algorithm Significance in Quantum Computing…


Quantum Safe Quantum Secure

Quantum-Safe vs. Quantum-Secure Cryptography

In 2010, I was serving as an interim CISO for an investment bank. During that…


Qubit Bloch Sphere

Qubits: A Brief Introduction for Cybersecurity Professionals

Introduction What Is a Qubit (and How Is It Different from a Bit)?…


Bell States

Bell States: An Introduction for Cybersecurity Professionals

What Are Bell States? The Four Bell States and Notation Entanglement in…


Kuperberg's Algorithm PQC

Kuperberg’s Algorithm and its Impact on Post-Quantum Cryptography (PQC)

What Is Kuperberg’s Algorithm and What Problem Does It Solve? How Does…


Quantum Computing Hype Hope

Balancing Quantum Computing Hype and Hope

Introduction The "Quantum Threat" to Encryption - Hype vs. Reality Cutting…


Quantum Computer Hype

Quantum Computing Hype and Fear: Same Song, New Verse

The Never-Ending Quantum Crypto Panic Reality Check: The State of Quantum…


Privacy Preference Center