Post

BSI recommends end of traditional asymmetric encryption methods

From the page“In the annual update to its cryptographic recommendations (TR-02102) [https://www.linkedin.com/posts/stefan-lukas-gazdag-5a30b67a_after-three-years-of-work-we-were-finally-ugcPost-7419043344926023681-abfb], the Federal Office for Information Security (BSI) has, for the first time, called for an end-of-life date for classical asymmetric encryption methods. According to the BSI, these methods should no longer be used on their own by the end of 2031—and by the… Read more »

Post

Secure Today, Vulnerable Tomorrow? Quantum Computing and the Risk to Encryption

A blog post by the National Cyber Security Center, Ireland (NCSC-IE) to explain the implications of developments in quantum computing and how to keep data and information secure From the page: “While you may think your encryption is future proof, advancements in quantum computing suggest what is secure today could be vulnerable tomorrow. Quantum computing… Read more »

Post

Proposal for a Directive as regards simplification measures and alignment with the Cybersecurity Act

The European Commission has proposed a new cybersecurity package to further strengthen the EU’s cybersecurity resilience and capabilities From the document:“Other targeted amendments to the NIS 2 Directive include:[…] the requirement for Member States to adopt policies for the migration to post-quantum cryptography (PQC) as part of their national cybersecurity strategy […] Given the continuously… Read more »