Researchers publish post-quantum upgrade to the Signal protocol

PQShield published a white paper that lays out the quantum threat to secure end-to-end messaging and explains how post-quantum cryptography (PQC) can be added to the Signal secure messaging protocol to protect it from quantum attacks. The company is of… Continue reading Researchers publish post-quantum upgrade to the Signal protocol

PQShield collaborates with Microchip Technology to address quantum threat

Post-quantum cryptography company PQShield has delivered new deals to introduce its quantum-ready cryptographic solutions to organizations across sectors. The company announces a major licensing deal with Microchip Technology, as well as a collaboratio… Continue reading PQShield collaborates with Microchip Technology to address quantum threat

When it comes to securing systems against quantum computers, there is no one-size-fits-all solution

Quantum computers will rapidly solve complex mathematical problems. This includes the ability to break both RSA and ECC encryption in seconds. In response, NIST has been leading an effort to define new cryptographic algorithms that will withstand attac… Continue reading When it comes to securing systems against quantum computers, there is no one-size-fits-all solution

PQShield expands its business team with two senior appointments

PQShield announces that it is bolstering its core business team with two new senior appointments, hiring Michael Vroobel as VP of Operations and Alan Grau as VP Business Development. Post-quantum cryptography is an increasingly mission-critical conside… Continue reading PQShield expands its business team with two senior appointments

Quantum computers: How to prepare for this great threat to information security

The race is on to build the world’s first reliable and truly useful quantum computer, and the finish line is closer than you might think – we might even reach it this decade. It’s an exciting prospect, particularly as these super-powerful machine… Continue reading Quantum computers: How to prepare for this great threat to information security