Articles
ETA: Why We Strive for Security That Doesn’t Compromise Privacy
Security owns a complex relationship with privacy, one that can work to protect privacy or undermine it. It is often a compromise, one for the other. Enterprises and other organizations regularly balance this relationship when protecting information systems. I am excited about Cisco’s launch of Encr…
Engineering Postquantum Security
While no one has yet built a general purpose Quantum Computer (QC) capable of breaking the public key cryptography in use on the Internet, that possibility is now considered a realistic threat to long-term security. As research into the design of a QC has intensified (including public access to a s…
Cybersecurity in the Post-Quantum Era
One of the great scientific challenges of our time is the construction of a practical quantum computer. Operating using the counterintuitive principles of quantum physics, such a device could rapidly explore an vast number of possible states. It could perform computational tasks that are far beyond…
David McGrew Discusses Legacy Encryption Solutions with Mike Danseglio of 1105 Media at RSA 2013
Today, many encrypted networks use insecure cryptography. Attackers exploiting weak cryptography are nearly undetectable, and the data you think is secure is less safe every day. Legacy encryption technology can’t keep up with current advances in hacking and brute force computing power. Additi…
2