Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Keywords: » cryptography

Items Tagged with 'cryptography'

ARTICLES

Blurry keyboard

Harvest Now, Decrypt Later: Preparing for the Quantum Hangover

Dimmick headshot
Victoria Dimmick
February 26, 2026

Quantum computing will be the next major shockwave to hit cybersecurity.


Read More
Rendered stairway and door

Quantum computing could arrive soon due to Microsoft’s new chip

Jordyn Alger, Managing Editor, Security
Jordyn Alger
February 24, 2025

According to Microsoft, quantum computers could be built within years instead of decades, citing a recent breakthrough. 


Read More
Futuristic digital monolith

Preparing for a post-quantum future amid machine identities

Bocek headshot
Kevin Bocek
August 30, 2024

By focusing on machine identity management practices that incorporate post-quantum cryptography, organizations can build a secure foundation in both the present and the quantum future.


Read More
software on computer screens

CISA publishes resource for migrating to post-quantum cryptography  

Security Staff
August 29, 2023

CISA urges organizations to begin early planning for migration to post-quantum cryptographic standards by developing quantum-readiness roadmaps.


Read More
keyboard keys swirled together

What CISOs need to know to mitigate quantum computing risks

David Bader
June 2, 2023

Although quantum computing can lead to positive and transformative solutions, the development also poses a significant threat to cybersecurity.


Read More
blue and pink digital spiral

48% of security leaders hesitant to adapt to post-quantum algorithms

Security Staff
March 23, 2023

According to research, the rise of machine identities has created visibility and management challenges for public key infrastructures (PKI).


Read More
Patrick Neise

Patrick Neise joins Groove as Chief Information Security Officer

Security Staff
February 20, 2023

Patrick Neise joins Groove as Chief Information Security Officer (CISO). Neise is a former Director of Operations for the NSA Red Team with a D.Eng.


Read More
laptop

Identity-first security boosts digital trust for humans & machines

David Mahdi
November 9, 2022

Adopting an identity-first security posture to establish digital trust is a key security measure for companies to mitigate cybersecurity risk.


Read More
cyber security network

Getting ahead of certificate-related outages with automation and visibility

Chris Hickman
August 18, 2022

The State of Machine Identity Management report from Keyfactor examined the role of public key infrastructure (PKI) and machine identities in securing modern enterprises.


Read More
password-freepik1170x658v678.jpg

Hashed passwords exposed in Slack vulnerability

Security Staff
August 9, 2022

Office communication platform Slack has admitted to accidentally exposing the hashed passwords of some users. 


Read More
More Articles Tagged with 'cryptography'
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing