Post

The Applied Quantum PQC Migration Framework & Methodology

From the document:“Why Government and Defense Requires a Sector Extension The Universal PQC Migration Framework provides a comprehensive 8-phase methodology applicable to any enterprise. Government and defense organizations can and should follow that methodology. However, this sector faces a unique combination of constraints that make PQC migration simultaneously more urgent, more regulated, and more complex… Read more »

Post

Cryptographic mechanisms – Update by ANSSI

…, the French National Cybersecurity Agency, to their recommendations on algorithms & hybrids: From the webpage:“Cryptography has seen major developments over the past few decades. Although its evolution is far from complete—as evidenced, for example, by the relatively recent emergence of new families of asymmetric algorithms presumed to be resistant to quantum threats—it appears to… Read more »

Post

PQC Webinar on the Status of the Transition and Strategic Challenges

… by the Trust in Digital Life Initiative (TDL), as reported by research institute CODE (Universität der Bundeswehr München): From the webpage:“The threat posed by future quantum computers to traditional public key cryptography makes the transition to post-quantum cryptography (PQC) a key strategic task. As part of the Trust in Digital Life (TDL) initiative, international… Read more »

Post

Why quantum security is a question leaders cannot ignore right now

Article as part of the Centre for Cybersecurity at World Econimic Forum, written by Anna Sarnek & Michael Brett (AWS): From the online article: Quantum computing is often framed as a future concern. For security leaders, that framing is already outdated. The risk of quantum computing is not defined solely by when a sufficiently powerful… Read more »

Post

Toshiba Enables Global Connectivity for Quantum-Safe Networks with Bridging Solution – with PQC

From the page” Toshiba Europe Limited today announced a new capability that enables the interconnection of geographically separated quantum key distribution (QKD) networks without the need for additional hardware. This capability allows network operators to offer their customers global quantum‑resistant connectivity, enhancing protection of sensitive data against retrospective decryption by future quantum computers. […] In… Read more »

Post

PQCA CBOMkit Architecture – Project Update

by Shubham Kumar: https://pqca.org/blog/2026/pqca-cbomkit-architecture/ From the page“CBOMkit is a collection of tools built by IBM (now under the Post-Quantum Cryptography Alliance) for generating and managing Cryptographic Bills of Materials (CBOMs). A CBOM is a structured inventory of the cryptographic assets present in a software system: algorithms, keys, protocols, and their properties. The kit enables organizations… Read more »

Post

5th PQC Update – Networking event on post-quantum cryptography

May 4 – 5, 2026, Garching, Germany The annual Fraunhofer AISEC networking event on post-quantum cryptography will take place in in Garching, Germany: From the webpage of the event:“The development of quantum computers is advancing rapidly, and with it the risk that they will crack conventional encryption methods. Companies, public authorities, and the entire digital… Read more »

Post

CYBERUK Returning to Glasgow in 2026

April 21 – 23, 2026, Glasgow, UK NCSC will mark its 10th anniversary year and return to Glasgow for CYBERUK, 21-23 April 2026, the UK government’s flagship cyber security event. This year promises to be one of the most memorable yet. Join over 2,500 cyber security leaders and technical professionals to examine this years’ theme… Read more »

Post

SPIQE – Workshop on Secure Protocol Implementations in the Quantum Era

July 10, 2026, Lisbon, Portugal Post-conference workshop in Lisbon, which is co-aligned with the 11th IEEE European Symposium on Security and Privacy. From the webpage of the event:“Security protocols are essential for safeguarding the digital communications and interactions that form the backbone of modern society. These protocols are increasingly under pressure from both classical vulnerabilities,… Read more »

Post

European Cyber Security Challenge 2026

October 12 – 16, 2026, Bochum, Germany The European Cyber Security Challenge 2026 is Europe’s largest cybersecurity competition, coming to Bochum this year. From the webpage:“National teams face off in Jeopardy and Attack-Defense challenges spanning web security, reverse engineering, cryptography, binary exploitation and more. Three days of non-stop hacking. The top young talents from national… Read more »