Using PPKs for Post-Quantum Security in...
Accelerating advancements in quantum computing are making the prospect of breaking classical cryptography more real with every passing today. Organizations rely on firewall site-to-site IPSec VPN security to protect their critical data. However, threat actors are already storing encrypted communications today to decrypt in the future, using quantum computing or other advanced capabilities (aka “Harvest Now, Decrypt Later”). IPSec V...
Preparing for Your Crypto Future: Marke...
From the Pentagon to boots-on-ground, cloud computing is driving actionable, data driven decisions that keep our nation safe. Effective data analytics require edge to cloud data collection as well as cloud to edge data dissemination. The secure transport of this data over disparate networks is driving interdependencies between data links over secure Layer 3 using High Assurance IP Encryption (HAIPE) and secure Layer 2 using Ethernet Data Encry...
FIPS 140-3 is (Finally) Here
FIPS 140-3, titled Security Requirements for Cryptographic Modules, is the third update to the FIPS 140 benchmark established by NIST to specify the security requirements for cryptographic modules and a testing methodology for confirming conformance. Companies selling technology with encryption to the public sector often must obtain FIPS 140 certification that their cryptography has been tested and approved for government use. In addition, oth...
Get Quantum Ready: Start Your Journey t...
The era of quantum computing is closer than ever and data protection standards are shifting. Are you ready for the transition to quantum-safe security?QuintessenceLabs and Carahsoft hosted an exclusive webinar on adopting the latest Quantum Resistant Algorithms (QRA) and crypto-agility strategies.Key takeaways from this webinar included:Understand the new NIST Quantum-Resistant Algorithms (QRA) and what they mean for youLearn practical steps t...
The Hidden Dangers of Legacy PAM: Why Y...
Attendees joined Keeper Security on January 14th to explore how government organizations can navigate the complex, ever-expanding threat landscape and overcome challenges introduced by remote work and multi-cloud environments. Keeper explained how to gain practical strategies to protect both human and machine infrastructures effectively with a zero-trust approach. During this webinar, attendees were able to learn about:How to address the zero...
Preparing for the Quantum Future: Advan...
Attendees learned about:Recent advancements in quantum technologies and their implications for national security and federal agency missionsThe impact of quantum computing and sensing breakthroughs on critical infrastructureA policy update on federal guidance for quantum R&D and securitySteps for adopting quantum-safe encryption and achieving crypto-agilityThe role of quantum key distribution (QKD) and other advanced security measures
Navigating the Shift to Post-Quantum En...
As quantum computing advances, federal agencies must proactively transition to quantum-resistant encryption to safeguard sensitive data and meet evolving compliance requirements. This webinar explored how agencies can navigate this critical transformation with confidence. Topics covered in this webinar included:Provide an in-depth look at the key challenges, regulatory mandates and structured approaches necessary for a smooth transitionHighlig...
Building Resiliency Across Your Endpoints
Ransomware attacks often go undetected for months or even years, with attackers escalating privileges before striking. This makes real-time endpoint visibility more crucial than ever, especially in today’s work-from-anywhere environment. Absolute Security and Forescout discussed how their partnership can help you stay ahead of threats. Together, they offer a powerful solution: the Absolute Connector for Forescout eyeSight, which integrat...
Quantum Technologies and the Public Sec...
Quantum technologies are rapidly moving from research labs into real-world applications. For government and public sector IT leaders, gaining a clear understanding of quantum computing, quantum networks, and post-quantum security is essential for making informed strategic decisions. These developments are reshaping the future of data protection, communications and mission-critical systems across the federal enterprise.In this session, Bob Gour...
Defense Ops Debates: Breach Lessons
3 Breaches. 1 Pattern Discord 2023. Signal 2024. Treasury 2024. Three leaks, three different attack paths, and one common blind spot: unsecured mission comms. Picture the next morning's brief: classified slides splashed across social media, an ops channel scraped, and the wrong key in the wrong hands. Now, the timeline moves fast: press, hearings, budget freezes. At 11 AM ET on June 26, a 30-year Navy SEAL and a retired USAF intel chief go fro...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.