var _hmt = _hmt || []; (function() { var hm = document.createElement("script"); hm.src = "https://hm.baidu.com/hm.js?d387e539c1f2d34f09a9afbac8032280"; var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(hm, s); })();

7x彩票网appDark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Ask The Experts

12/27/2019
07:00 AM
Edge Editors
Edge Editors
Ask the Experts
0%
100%

How Can My Security Team Begin Future-Proofing for Quantum Computing?

Knowing where your digital certificates are is just the start.

Question: How should my security department begin future-proofing for quantum computing?

JD Kilgallin, senior integration engineer at Keyfactor:7x彩票网app To future-proof enterprise networks and systems against threats posed by quantum computing, security teams should be prepared to take quick action. At the very least, this requires knowing where your digital certificates are, what cryptographic algorithms their keys are using and what quantum computing means for them, and what systems need to trust those certificates and might experience an outage if the certificate and its chain suddenly change.

7x彩票网appIt also requires the ability to quickly coordinate changes between entity certificates and the trust anchors of other endpoints that rely on those certificates. Administrators should keep a careful inventory of these keys and certificates and employ automated techniques to securely deploy updates en masse. This can be a large undertaking that administrators should begin preparing for sooner rather than later.

7x彩票网appIn the meantime, security teams should ensure that all sensitive communications that rely on digital certificates to protect communication confidentiality are employing ciphers that offer forward secrecy, so that stored communications are not disclosed when the key is compromised in the future by quantum computers.

Related Content:

 

The Edge is Dark Reading's home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio

Comment  | 
Print  | 
More Insights
Webcasts
More Webcasts
White Papers
Reports
Comments
Newest First  |  Oldest First  |  Threaded View
   OVER THE EDGE
An Identity Management Spin on Shaggy's Hit Song

What security-related videos have made you laugh? Let us know! Send them to [email protected].

The Edge Cartoon Caption Contest: Latest Winners, New Toon 'Like a Boss'
Flash Poll
66?????? 7072???? 7073???? 689????? 963???? 66????? 7073???? 7073???? 66???app 8????app