Post

Quantum Computing: Leadership Needed to Coordinate Cyber Threat Mitigation Strategy

Information by the U.S. Government Accountability Office (GAO) Quantum computers could address some critical problems that are not possible to solve with conventional computers within the span of a human lifetime. However, GAO has reported that the emergence of quantum computers could undermine the security of widely used cryptographic methods (e.g., encryption) that federal agencies… Read more »

Post

Quantum Threat Tracker Released

The Quantum Threat Tracker is a tool for quantifying the threat quantum computers pose to real-world cryptosystems. In recent years, quantum computing has seen a flurry of improvements in error correction, magic state distillation, arithmetic circuits, and more. As a consequence, the threat posed by Shor’s algorithm against public-key cryptographic protocols has changed from being… Read more »

Post

Chairs’ Statement on G7 Cybersecurity Working Group Meeting

Canada, under the leadership of the Communications Security Establishment Canada (CSE) and Public Safety Canada, hosted the G7 Cybersecurity Working Group (Working Group) from May 12 to 13, 2025, in Ottawa, to discuss shared issues on cyber security  and emerging technology. The Working Group was established in 2024 under Italy’s G7 leadership and is composed of… Read more »

Post

AWS KMS Adds Support for Post-Quantum ML-DAS Digital Signatures

The AWS Key Management Service (KMS) now supports the FIPS 203 Module-Lattice Digital Signature Standard (MLDSA), a quantum-resistant digital signature algorithm designed to help organizations combat emerging quantum computing threats. This post-quantum signature algorithm is one of the select algorithms standardized by NIST to protect sensitive information well into the foreseeable future, even after the… Read more »

Post

BSI Trend Survey 2025

Participation is anonymous and is possible until 11.08.2025 The BSI is the cyber security authority of the Federal Government and the shaper of secure digitalization in Germany. Its goal is the secure use of information and communication technology in government, business and society. With the support of the BSI, information security should be understood as… Read more »

Post

Securing Sovereignty: Cybersecurity & Defence in the Age of Digital Threats

July 3, 2025, Frankfurt, Germany ​Digital threats are becoming more frequent and sophisticated: protecting sensitive data and systems is no longer just an IT issue, it’s a core multi-disciplinary challenge. This event, hosted by Plug and Play and Airbus Defence and Space, brings together industry leaders & defence experts to explore how Sovereign Cloud architectures are enabling secure data environments and compliance with national defence… Read more »

Post

The 30th Nordic Conference on Secure IT Systems (NordSec) 2025

November 12-13, 2025, Tartu, Estonia The University of Tartu Institute of Computer Science will host the NordSec 2025 on November 12-13, 2025, in Tartu, Estonia. NordSec is an annual research conference series that has been running since 1996. The NordSec conferences address a broad range of topics on IT security. The events bring together security researchers from… Read more »

Post

Cyber EUnnovate 2025 

September 11, 2025, Athens, Greece The organizer stated: “The Cyber EUnnovate 2025 aims to become a high-level industry event exploring the intersection of innovation, AI, and cybersecurity in the EU.” With a strong focus on strategic technologies such as AI-based cybersecurity tools, secure and resilient AI models, post-quantum readiness, and secure semiconductors, the conference will… Read more »

This website stores cookies on your computer. These cookies are used to provide a more personalized experience and to track your whereabouts around our website in compliance with the European General Data Protection Regulation. If you decide to to opt-out of any future tracking, a cookie will be setup in your browser to remember this choice for one year.

Accept or Deny