Ep 63 - Quantum Computing
Listen now
Description
Episode Summary: In this episode, Bryan Young invites Igor Barshteyn to demystify quantum computing and its implications for cybersecurity. They dive into the intricacies of how quantum computing challenges current encryption methods, specifically public key cryptography, and what that means for data security. The discussion pivots around the looming necessity for transition to post-quantum cryptography and the roles that various entities like NIST, NSA, and leading tech companies are playing in this arena. Key Points Discussed: Quantum computing's impact on current encryption standards. How recorded encrypted data can be at risk in the future with advancements in quantum computing. The urgency and challenges in transitioning to post-quantum cryptography. The roles of NIST and NSA in standardizing new cryptographic measures. The legal and personal implications for CISOs in the wake of cybersecurity breaches. Global efforts towards developing quantum-resistant cryptographic standards. Notable Quotes: "Quantum computers can rapidly factor large numbers, breaking the key establishment part of encryption protocols." "The threat of quantum computing on data security is here now due to the ability to capture and store encrypted data for future decryption." "There's a cybersecurity jobs crisis looming with the emergence of quantum computing technology." Resources Mentioned: SolarWinds lawsuit article NIST's post-quantum cryptography project Open Quantum Safe project Call to Action: For listener questions and feedback: [email protected] Join the Conf T Discord community to engage in discussions: https://discord.conft.show Visit the Conf T merch shop: Conf T Merch Closing Thoughts: Bryan and Igor emphasize the importance of staying informed and proactive in the face of quantum computing's challenges to cybersecurity. They encourage listeners to audit their encryption protocols and prepare for the inevitable transition to quantum-resistant cryptography.
More Episodes
Summary   This conversation explores the role of a SOC analyst and the challenges they face in the cybersecurity field. It covers the structure and responsibilities of a SOC team, the impact of remote work on communication and collaboration, and the skills required to be a successful SOC...
Published 03/04/24
Published 03/04/24
Show Notes for Episode 64: Penetration Testing and Remediation in Cybersecurity Welcome to Episode 64 of our cybersecurity-focused podcast! In this installment, our host Bryan Young is joined by two experts in the field of cyber defense, Megan Scherer and Ryan Wager from Secure Network...
Published 12/06/23