September 7, 2022
Since we raised our 4.8M USD fundraising round in March 2021, our main concern at Cryptosense has been scaling up our whole organization, from engineering to sales to marketing. However, it became clear towards the end of 2021 that our scaleup operation was going to have to happen much faster than we had anticipated.
Read Article ->July 18, 2022
After six years of competition, analysis, and testing, NIST has finally selected a suite of four quantum secure algorithms that will be used to secure the world as quantum computers are adopted. Did they choose the right algorithms?
Read Article ->May 23, 2022
On May 4th, President Biden signed a new executive order focused on post quantum cryptography, his second featuring this subject in 2022, and we’ve still 8 months of the year to go.
Read Article ->February 4, 2022
On the 18th of January, President Biden signed an Executive Order that instantly re-shaped priorities and plans across all Federal Agencies. You may recall the previous order that was put out in May 2021. What’s new?Where May 2021 set out intentions, January 2022 sets out demands. Advice becomes requirements, and those requirements now have deadlines. In some cases agencies have 180 days (18th of July), and in some cases 30 days (18th of February).
Read Article ->July 6, 2021
Cryptography is an essential enabling technology for modern business: without it we would not be able to protect our sensitive data or carry out authentication. When perfectly implemented and maintained, cryptography provides security we can rely on. However, detailed errors in its usage can lead to total loss of protection, and our increasing reliance on cryptography means that these mistakes now carry significant financial and reputational risks.
Read Article ->November 20, 2020
These are anxious times. For the worriers among us 2020 has been a bumper year. We’ve had a global pandemic and the rise of Fascism in democratic countries. Not content with this, the techno-literate fretful have added ‘Quantum Supremacy’ to the list of concerns....
Read Article ->June 3, 2020
This may seem obvious, but in large organizations where the inventory is required by multiple teams for different reasons, conflicts can easily arise....
Read Article ->August 26, 2019
A cryptographic inventory is a strategic cybersecurity asset much like other hardware and software inventories. It enables an organisation to enforce a secure cryptographic policy across IT infrastructure, react quickly to security issues, and efficiently carry out strategic transformations such as migrating crypto services to the cloud or deploying post-quantum cryptography. In order to do achieve this, an inventory needs to have the following properties:
Read Article ->March 22, 2019
A first step of many cryptography projects - preparation for Cloud migration, crypto agility, or improving application security, is to map out the cryptography actually in use in an application. A naive approach would be to just review the source code and search for cryptographic calls. However, this is both time-consuming and error-prone...
Read Article ->October 3, 2018
Computers that exploit quantum mechanical properties offer the promise of (supposedly) unbreakable cryptography and other exciting applications, but they will also cause a huge, immediate problem: the day a large, practical quantum computer is developed, all existing widely-used asymmetric cryptography will be broken.
Read Article ->