Post

EU reinforces its cybersecurity with post-quantum cryptography

“As we enter the quantum era, post-quantum cryptography is essential to ensure a high level of cybersecurity, fortifying our systems against future threats. The post-quantum cryptography roadmap provides a clear direction to ensure the robust security of our digital infrastructure.”, said Henna Virkkunen, Executive Vice-Präsident for Technological Sovereignty, Security, and Democracy of the EU Commission… Read more »

Post

Quantum Computing: Leadership Needed to Coordinate Cyber Threat Mitigation Strategy

Information by the U.S. Government Accountability Office (GAO) Quantum computers could address some critical problems that are not possible to solve with conventional computers within the span of a human lifetime. However, GAO has reported that the emergence of quantum computers could undermine the security of widely used cryptographic methods (e.g., encryption) that federal agencies… Read more »

Post

Quantum Threat Tracker Released

The Quantum Threat Tracker is a tool for quantifying the threat quantum computers pose to real-world cryptosystems. In recent years, quantum computing has seen a flurry of improvements in error correction, magic state distillation, arithmetic circuits, and more. As a consequence, the threat posed by Shor’s algorithm against public-key cryptographic protocols has changed from being… Read more »

Post

Chairs’ Statement on G7 Cybersecurity Working Group Meeting

Canada, under the leadership of the Communications Security Establishment Canada (CSE) and Public Safety Canada, hosted the G7 Cybersecurity Working Group (Working Group) from May 12 to 13, 2025, in Ottawa, to discuss shared issues on cyber security  and emerging technology. The Working Group was established in 2024 under Italy’s G7 leadership and is composed of… Read more »

Post

AWS KMS Adds Support for Post-Quantum ML-DAS Digital Signatures

The AWS Key Management Service (KMS) now supports the FIPS 203 Module-Lattice Digital Signature Standard (MLDSA), a quantum-resistant digital signature algorithm designed to help organizations combat emerging quantum computing threats. This post-quantum signature algorithm is one of the select algorithms standardized by NIST to protect sensitive information well into the foreseeable future, even after the… Read more »

Post

BSI Trend Survey 2025

Participation is anonymous and is possible until 11.08.2025 The BSI is the cyber security authority of the Federal Government and the shaper of secure digitalization in Germany. Its goal is the secure use of information and communication technology in government, business and society. With the support of the BSI, information security should be understood as… Read more »

Post

Apple CryptoKit inclues quantum-secure APIs now 

Apple therefore provides Sample Code (link) and a Video Tutorial (link) to introduce developers using CryptoKit into ist PQC capabilities.CryptoKit, is Apple’s framework for conducting cryptographic operations safely and efficiently, such as: Origin of text: https://developer.apple.com/documentation/cryptokit/Foto von Laurenz Heymann auf Unsplash

Post

National Cybersecurity Strategies: What’s new in the EU’s national cybersecurity policymaking 

Map unveiled in June The European Union Agency for Cybersecurity (ENISA) unveils the update of the National Cybersecurity Strategies (NCSS) Interactive Map, a dynamic digital platform and tool offering an overview of EU-wide national cybersecurity strategies. Go direct to the map: https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map/national-cyber-security-strategies-interactive-map Text origin and more information: https://www.enisa.europa.eu/news/national-cybersecurity-strategies-whats-new-in-the-eus-national-cybersecurity-policymakingFoto von USGS auf Unsplash

Post

Update by ECCG on Agreed Cryptographic Mechanisms involves PQC 

The ECCG (European Cybersecurity Certification Group), sub-group on Cryptography, has published the update to version 2.0 on the Agreed Cryptographic Mechanisms at the end of April.  Compared to its predecessor version 1.3, compiled still by SO-GIS (Senior Officials Group Information Systems Security) in February 2023, post-quantum cryptography is recognized playing a much bigger, major role in cybersecurity and in the… Read more »