Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Trending

Claressa Shields Tags 3 Legends In Latest Callout

July 16, 2025

AI Agents Are Rewriting the Rules of Retail — Even for the Little Guys

July 16, 2025

Seagate HDDs For AI And Panmnesia’s Composable AI Infrastructure

July 15, 2025
Facebook Twitter Instagram
  • Newsletter
  • Submit Articles
  • Privacy
  • Advertise
  • Contact
Facebook Twitter Instagram
Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Subscribe for Alerts
Startup DreamersStartup Dreamers
Home » Crypto Visibility Is The First Step Toward Quantum-Safe Cybersecurity
Innovation

Crypto Visibility Is The First Step Toward Quantum-Safe Cybersecurity

adminBy adminJuly 25, 20230 ViewsNo Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email

Vince Berk is the Chief Strategist at Quantum Xchange, a post-quantum crypto-agility provider. Ph.D. in AI/ML, founder of FlowTraq.

Many security conversations revolve around intrusive attacks, hacks and threats, with far less focus on the risks of a much larger attack due to the failure of cryptography.

The danger is being augmented by the potential for the speed of advanced computers and quantum technology to decrypt sensitive data. This raises the stakes for security professionals to be prepared for the quantum eventuality.

The U.S. National Institute of Standards and Technology (NIST) is hard at work preparing new encryption algorithms that will give us diversity and optionality in encrypting, and the National Cybersecurity Center of Excellence is trying to help security professionals plan for the forthcoming migration to that new, quantum-resistant cryptography.

That said, protection starts with visibility into the state of your cryptographic infrastructure.

For a variety of reasons, the cryptography we all rely on “just being there” often turns out “not to be there.”

When it comes to cybersecurity, most people focus on “detectors”—network detection tools, phishing email scanners, intrusion detection and malware detection tools—to spot intrusions. This detection-first approach often leaves organizations without adequate visibility and forensic ability to determine what happened.

And with costs up to $100,000 per incidence, the reality is that most companies just try to clean up the known mess and move on.

But even with a modest investment in visibility, these “flight recorders” can harness that forensic data when a breach happens. Conversely, you can use that exact same information to your advantage—before the bad guy gets in.

Visibility works both ways.

Case in point: Most internal systems are configured to use a basic software protocol to store passwords and usernames as part of authenticating a user’s right to access applications or files.

All it takes is one user to click on a phishing link, and the hacker is inside the network with that one person’s credentials. At first, the attacker can only access what’s available to that one user. But they can sniff around the network, listen to traffic, see who’s logging in via an unencrypted authentication protocol that should have been encrypted and then they can spread.

And they spread quickly. A survey of 300 ethical hackers found that nearly 60% of hackers needed less than five hours to exploit a weakness and access data, with 20% saying they could escalate privileges in under two hours.

Such short timelines are a consequence of lacking security implementation inside the perimeter. If you work under the premise the bad guy is going to come in, you can devise policies and practices to make it hard for him to just walk around once he’s inside your network.

Following the guiding philosophies of zero trust network access goes a long way in making it harder for the adversary to gain deeper access, but unfortunately, the “as designed” is frequently different from the “as implemented” state of zero trust.

Taking proactive steps toward the visibility and auditability of the network is, therefore, crucial. And although access control is often audited, on-network cryptography frequently is not assessed.

First, you need to discover your cryptographic risks. Understand when, where and how encryption is used within your organization and, most crucially, where encryption is deficient or outright lacking. You’ll be able to define an inventory of risks and prioritize them based on your own needs.

Second, assess cryptographic risks in near real time, including monitoring the status of security certificates and crypto handshakes and communications sessions. You’ll be able to visualize possible criminal intent and detect violations.

And third, examine and validate your security policies vis-à-vis ongoing cryptographic changes. This will provide full and continuous crypto management and control as you move toward modernizing encryption standards.

Enterprise data is only safe if encryption is working. When you’re able to discover risks, assess threats and validate security policies, you’ll be better prepared to defend when the adversary eventually enters your network.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Read the full article here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Articles

Claressa Shields Tags 3 Legends In Latest Callout

Innovation July 16, 2025

Seagate HDDs For AI And Panmnesia’s Composable AI Infrastructure

Innovation July 15, 2025

A Cybersecurity Primer For Businesses In 2025

Innovation July 14, 2025

Today’s Extra Clues And Answers

Innovation July 13, 2025

One Of The Best Action Movies Ever Made Lands On Netflix Today

Innovation July 12, 2025

Today’s NYT Mini Crossword Clues And Answers For Friday, July 11th

Innovation July 11, 2025
Add A Comment

Leave A Reply Cancel Reply

Editors Picks

Claressa Shields Tags 3 Legends In Latest Callout

July 16, 2025

AI Agents Are Rewriting the Rules of Retail — Even for the Little Guys

July 16, 2025

Seagate HDDs For AI And Panmnesia’s Composable AI Infrastructure

July 15, 2025

How Much Money You Need to Be Wealthy: Survey

July 15, 2025

‘People Are Going to Die’: A Malnutrition Crisis Looms in the Wake of USAID Cuts

July 15, 2025

Latest Posts

Why Surcharging Is a Bad Move For Small Businesses — and What to Do Instead

July 14, 2025

Can’t Get an Email Back? These 7 Tips Will Make Sure You Get a Response Every Time

July 14, 2025

How to Build a Side Hustle That Stands on Its Own — Without Burning Out

July 14, 2025

Tornado Cash Made Crypto Anonymous. Now One of Its Creators Faces Trial

July 14, 2025

Today’s Extra Clues And Answers

July 13, 2025
Advertisement
Demo

Startup Dreamers is your one-stop website for the latest news and updates about how to start a business, follow us now to get the news that matters to you.

Facebook Twitter Instagram Pinterest YouTube
Sections
  • Growing a Business
  • Innovation
  • Leadership
  • Money & Finance
  • Starting a Business
Trending Topics
  • Branding
  • Business Ideas
  • Business Models
  • Business Plans
  • Fundraising

Subscribe to Updates

Get the latest business and startup news and updates directly to your inbox.

© 2025 Startup Dreamers. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

GET $5000 NO CREDIT