Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Trending

OpenAI’s President Gave Millions to Trump. He Says It’s for Humanity

February 18, 2026

Meta Goes to Trial in a New Mexico Child Safety Case. Here’s What’s at Stake

February 16, 2026

Salesforce Workers Circulate Open Letter Urging CEO Marc Benioff to Denounce ICE

February 15, 2026
Facebook Twitter Instagram
  • Newsletter
  • Submit Articles
  • Privacy
  • Advertise
  • Contact
Facebook Twitter Instagram
Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Subscribe for Alerts
Startup DreamersStartup Dreamers
Home » Crypto Visibility Is The First Step Toward Quantum-Safe Cybersecurity
Innovation

Crypto Visibility Is The First Step Toward Quantum-Safe Cybersecurity

adminBy adminJuly 25, 20230 ViewsNo Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email

Vince Berk is the Chief Strategist at Quantum Xchange, a post-quantum crypto-agility provider. Ph.D. in AI/ML, founder of FlowTraq.

Many security conversations revolve around intrusive attacks, hacks and threats, with far less focus on the risks of a much larger attack due to the failure of cryptography.

The danger is being augmented by the potential for the speed of advanced computers and quantum technology to decrypt sensitive data. This raises the stakes for security professionals to be prepared for the quantum eventuality.

The U.S. National Institute of Standards and Technology (NIST) is hard at work preparing new encryption algorithms that will give us diversity and optionality in encrypting, and the National Cybersecurity Center of Excellence is trying to help security professionals plan for the forthcoming migration to that new, quantum-resistant cryptography.

That said, protection starts with visibility into the state of your cryptographic infrastructure.

For a variety of reasons, the cryptography we all rely on “just being there” often turns out “not to be there.”

When it comes to cybersecurity, most people focus on “detectors”—network detection tools, phishing email scanners, intrusion detection and malware detection tools—to spot intrusions. This detection-first approach often leaves organizations without adequate visibility and forensic ability to determine what happened.

And with costs up to $100,000 per incidence, the reality is that most companies just try to clean up the known mess and move on.

But even with a modest investment in visibility, these “flight recorders” can harness that forensic data when a breach happens. Conversely, you can use that exact same information to your advantage—before the bad guy gets in.

Visibility works both ways.

Case in point: Most internal systems are configured to use a basic software protocol to store passwords and usernames as part of authenticating a user’s right to access applications or files.

All it takes is one user to click on a phishing link, and the hacker is inside the network with that one person’s credentials. At first, the attacker can only access what’s available to that one user. But they can sniff around the network, listen to traffic, see who’s logging in via an unencrypted authentication protocol that should have been encrypted and then they can spread.

And they spread quickly. A survey of 300 ethical hackers found that nearly 60% of hackers needed less than five hours to exploit a weakness and access data, with 20% saying they could escalate privileges in under two hours.

Such short timelines are a consequence of lacking security implementation inside the perimeter. If you work under the premise the bad guy is going to come in, you can devise policies and practices to make it hard for him to just walk around once he’s inside your network.

Following the guiding philosophies of zero trust network access goes a long way in making it harder for the adversary to gain deeper access, but unfortunately, the “as designed” is frequently different from the “as implemented” state of zero trust.

Taking proactive steps toward the visibility and auditability of the network is, therefore, crucial. And although access control is often audited, on-network cryptography frequently is not assessed.

First, you need to discover your cryptographic risks. Understand when, where and how encryption is used within your organization and, most crucially, where encryption is deficient or outright lacking. You’ll be able to define an inventory of risks and prioritize them based on your own needs.

Second, assess cryptographic risks in near real time, including monitoring the status of security certificates and crypto handshakes and communications sessions. You’ll be able to visualize possible criminal intent and detect violations.

And third, examine and validate your security policies vis-à-vis ongoing cryptographic changes. This will provide full and continuous crypto management and control as you move toward modernizing encryption standards.

Enterprise data is only safe if encryption is working. When you’re able to discover risks, assess threats and validate security policies, you’ll be better prepared to defend when the adversary eventually enters your network.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Read the full article here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Articles

Today’s Wordle #1686 Hints And Answer For Friday, January 30

Innovation January 30, 2026

Today’s Wordle #1685 Hints And Answer For Thursday, January 29

Innovation January 29, 2026

Today’s Wordle #1684 Hints And Answer For Wednesday, January 28

Innovation January 28, 2026

U.S. Revamps Wildfire Response Into Modern Central Organization

Innovation January 27, 2026

Studies Are Increasingly Finding High Blood Sugar May Be Associated With Dementia

Innovation January 26, 2026

Google’s Last Minute Offer For Pixel Customers

Innovation January 25, 2026
Add A Comment

Leave A Reply Cancel Reply

Editors Picks

OpenAI’s President Gave Millions to Trump. He Says It’s for Humanity

February 18, 2026

Meta Goes to Trial in a New Mexico Child Safety Case. Here’s What’s at Stake

February 16, 2026

Salesforce Workers Circulate Open Letter Urging CEO Marc Benioff to Denounce ICE

February 15, 2026

Jeffrey Epstein Advised an Elon Musk Associate on Taking Tesla Private

February 14, 2026

AI Industry Rivals Are Teaming Up on a Startup Accelerator

February 13, 2026

Latest Posts

How iPhones Made a Surprising Comeback in China

February 10, 2026

Loyalty Is Dead in Silicon Valley

February 9, 2026

Epstein Files Reveal Peter Thiel’s Elaborate Dietary Restrictions

February 7, 2026

The Tech Elites in the Epstein Files

February 6, 2026

Elon Musk Is Rolling xAI Into SpaceX—Creating the World’s Most Valuable Private Company

February 5, 2026
Advertisement
Demo

Startup Dreamers is your one-stop website for the latest news and updates about how to start a business, follow us now to get the news that matters to you.

Facebook Twitter Instagram Pinterest YouTube
Sections
  • Growing a Business
  • Innovation
  • Leadership
  • Money & Finance
  • Starting a Business
Trending Topics
  • Branding
  • Business Ideas
  • Business Models
  • Business Plans
  • Fundraising

Subscribe to Updates

Get the latest business and startup news and updates directly to your inbox.

© 2026 Startup Dreamers. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

GET $5000 NO CREDIT