Explore >> Select a destination


You are here

securityinaction.wordpress.com
| | blog.eclecticiq.com
2.7 parsecs away

Travel
| | This Analyst Prompt examines key differences in environments and threat actor approaches and how centralizing intelligence better prepares an organization in the quantum computing world.
| | thomasbandt.com
2.1 parsecs away

Travel
| | Analyzing quantum computing's impact on cryptography, this post briefly discusses challenges in encryption and advances in post-quantum cryptography, emphasizing the race for quantum-resistant security.
| | blog.trailofbits.com
2.6 parsecs away

Travel
| | By Tjaden Hess Earlier this week, NIST officially announced three standards specifying FIPS-approved algorithms for post-quantum cryptography. The Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) is one of these standardized algorithms. The Trail of Bits cryptography team has been anticipating this announcement, and we are excited to share an announcement of our own: we built an...
| | a16zcrypto.com
23.8 parsecs away

Travel
| The year 2021 marked a watershed moment for web3. Significant numbers of policymakers began to grasp the potential of web3 to democratize access to opportunity, provide individuals with more control of their data, and build a better internet. In the year ahead, many of these leaders will work to create legal and regulatory architecture to... Read More