Expert Membership FAQ
Common questions from prospective QSECDEF expert members: which category applies, what the application process looks like, what happens at each tier…
Blog
Expert analysis, quantum security news, and industry developments from QSECDEF. 88 articles across insights and news.
Common questions from prospective QSECDEF expert members: which category applies, what the application process looks like, what happens at each tier…
QSECDEF runs a structured vetting process before listing any organisation in its directory. This post explains the categories, the question sets, the…
RSA relies on integer factoring. ECC relies on elliptic curve discrete logarithms. Shor's algorithm solves both efficiently. Here is why, and what to…
Most enterprises that have engaged with quantum risk planning have encountered 2030. It appears in NIST's deprecation schedule. It appears in NSA CNSA…
The term 'crypto agility' appears in procurement documents, vendor briefings, and RFP responses with a frequency that has outpaced its precision. In…
NIST finalised its first post-quantum algorithm standards on 13 August 2024 — FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA). The…
Most CISOs can tell you they have a quantum problem. Very few can tell you which of their systems are most exposed, which assets need to move first,…
The question 'will quantum computers break encryption?' has an answer: yes, with a sufficiently large cryptographically relevant quantum computer, the…
Understanding the Harvest Now, Decrypt Later threat is not the same as knowing which of your data is already at risk. Most organisations that have…
PQC migration cannot happen across all systems simultaneously, resources are finite, and the wrong migration order leaves your highest-risk assets…
Algorithm deprecation is not a future risk — it is a current compliance requirement with documented timelines published by NIST, NSA, and ETSI. The…
PQC migration is not a bounded project with a clear entry point — it is a programme that cuts across every layer of infrastructure, with…
Readiness in the context of PQC migration means something more specific than awareness of the quantum threat. Most organisations that consider…
Most quantum security tools ask how ready your organisation is to migrate to post-quantum cryptography. This tool asks a different question: across…
NIST finalised three post-quantum cryptographic standards in August 2024: FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA). For a security…
The conversation about OT quantum security migration tends to start in the same place: an asset with no upgrade path. The OT Cryptographic Asset…
Most quantum security discussions in operational technology focus on the systems. The scanner works at a lower layer: the communication protocols…
Every blockchain operator knows migration to quantum-resistant cryptography is coming. What most do not know is how complex their specific migration…
There are two ways to assess blockchain quantum exposure. The technical approach scans at the protocol layer. The strategic approach asks: how…
The Blockchain Quantum Exposure Scanner operates at the technical layer: it identifies which specific signature schemes, wallet address types, and…
Quantum security is an emerging solution category with a large but unevenly distributed market. A pre-sales team without a structured qualification…
An organisation considering quantum key distribution has already moved past asking whether quantum security matters. They are asking: is QKD the right…
NSA CNSA 2.0 sets specific cryptographic transition requirements for national security systems, including satellite command and control. Most space…
Q-Day is the threshold at which public-key cryptography ceases to provide security against a quantum adversary. Most enterprises are not preparing.…
NIST published FIPS 203, 204, and 205 in August 2024. The algorithm selection phase is over. What security architects need to understand is which…
HNDL is not a theoretical risk. The NSA said in 2021 that adversaries are collecting encrypted data today. Here is what the evidence shows, what it…
NIST published four post-quantum standards in August 2024. This is the reference a CISO or architect needs to understand what each standard does,…
Most board quantum security briefings produce awareness, not decisions. The CISO's challenge is translation. This is a practical guide to structuring…
Financial services faces a structurally higher quantum security exposure than most sectors. Regulatory retention requirements, interconnected…
Most PQC migration programmes treat the perimeter of the problem as the perimeter of the organisation. It is not. Every supplier that exchanges…
Subscribe to the QSECDEF newsletter for weekly updates on quantum security, new lecture recordings, and upcoming events.
Subscribe to Newsletter