
Store now, decrypt later: Risk factor quantum computing
Why post-quantum cryptography needs to be on your IT agenda now.
Topic
Education and trainingData security / DLP / Know-how protectionTrend topic
When & Where
Details
Format:
Workshop
Session description
Are you currently using secure encryption methods and recommended key lengths to protect your critical confidential data? The impression of security is deceptive: intelligence agencies and other organizations are already collecting encrypted data today in order to decrypt it in the future.
A relevant attack vector will be in quantum computing, which is likely to break many of today's procedures in a few years. If you want your data, which will be intercepted tomorrow, to remain protected the day after tomorrow, you need to act now.
Learn from our qSkills cryptography expert what measures you can implement or plan today.
A relevant attack vector will be in quantum computing, which is likely to break many of today's procedures in a few years. If you want your data, which will be intercepted tomorrow, to remain protected the day after tomorrow, you need to act now.
Learn from our qSkills cryptography expert what measures you can implement or plan today.