Skip to main content
Hit enter to search or ESC to close
Close Search
QryptoCyberQryptoCyberQryptoCyberQryptoCyber
Menu
  • HOME
    • The 101: Don’t Look Up
  • PRODUCTS
    • Cryptographic AI²: AI Cryptographic Inventory & Management
    • The Five Pillars of Cryptographic Discovery & Inventory
    • Pillar I: External Networks
    • Pillar II: Internal Networks
    • Pillar III: IT, IoT & OT Assets
    • Pillar IV: Databases
    • Pillar V: Code
    • COAR (Cryptographic Orchestration, Automation, and Remediation)
    • PCI DSS 4 | 12.3.3
  • SERVICES
    • Cryptographic Inventory Workshop Exercise
    • Cryptographic Inventory Simulation
  • SOLUTIONS
    • Quantum Computing Impact on MITRE ATT&CK Techniques
    • Quantitative Quantum Risk Assessments
    • PCI DSS Requirement 12.3.3
    • Quantum Zero Trust
    • Quantum-Readiness: Cryptographic Inventory
  • COMPANY
    • WHY US
    • SUPPORT
    • BLOG
  • CONTACT US
    All Posts By

    Jeffrey Duran

    Jeffrey Duran has over 30 years of leadership in marketing and entrepreneurship, including 14 years in cybersecurity. He has been featured in prominent publications like Dark Reading and Verizon’s Data Breach Investigation Report. Jeff’s marketing strategies have driven startups like Invotas and enSilo, and major entities like Army Cyber Command and Verizon. A 35-year U.S. Army veteran, he integrates veterans into cybersecurity roles. Currently a Fractional CMO, he also serves on advisory boards and has won numerous awards for his communication skills.

    No Clue Where to Start with PQC? Here’s Step Zero – Our New Services to Kickstart Your Journey Cryptographic Inventory Tabletop Exercise
    Crypto AgilityCryptographic InventoryQryptoCyber Cryptographic Discovery and InventoryQuantum RiskQuantum Safe Cybersecurity

    No Clue Where to Start with PQC? Here’s Step Zero – Our New Services to Kickstart Your Journey

    We Made CBOMs Useful By Becoming an AI Company
    AICryptanalytically Relevant Quantum Computers (CRQC)Cryptographic InventoryPQC TransformationPrioritized Inventory of Cryptographic SystemsQryptoCyber Cryptographic Discovery and Inventory

    We Made CBOMs Useful By Becoming an AI Company

    QryptoCyber and ExeQuantum Partner to Launch World’s First End-to-End Cryptographic Remediation Platform the world’s first end-to-end cryptographic remediation platform
    QryptoCyber Cryptographic Discovery and Inventory

    QryptoCyber and ExeQuantum Partner to Launch World’s First End-to-End Cryptographic Remediation Platform

    Venari Security and QryptoCyber Partner to Deliver the First End-to-End Cryptographic Compliance and Quantum Risk Management Solution Venari Security and QryptoCyber Partner
    QryptoCyber Cryptographic Discovery and Inventory

    Venari Security and QryptoCyber Partner to Deliver the First End-to-End Cryptographic Compliance and Quantum Risk Management Solution

    PQC Transformation: No One Wants to Do This Job. But Someone Has To. https://romania-photo-tours.com/
    PQC TransformationQryptoCyber Cryptographic Discovery and InventoryQuantitative Quantum Risk

    PQC Transformation: No One Wants to Do This Job. But Someone Has To.

    How I Learned to Stop Worrying and Love the CBOM: PQC Transformation How I Learned to Stop Worrying and Love the CBOM
    Cryptographic InventoryQryptoCyber Cryptographic Discovery and Inventory

    How I Learned to Stop Worrying and Love the CBOM: PQC Transformation

    The Post-Quantum Journey: Migration to Post-Quantum Cryptography The Post-Quantum Journey: Migration to Post-Quantum Cryptography
    QryptoCyber Cryptographic Discovery and InventoryQuantum RiskQuantum-Safe Cybersecurity

    The Post-Quantum Journey: Migration to Post-Quantum Cryptography

    The CBOM Outcome Matters: Why QryptoCyber Stands Out Encryption is often embedded deep within application logic, making it critical to identify vulnerable or deprecated algorithms used in proprietary or third-party code
    QryptoCyber Cryptographic Discovery and Inventory

    The CBOM Outcome Matters: Why QryptoCyber Stands Out

    Why Using Excel for PCI DSS 12.3.3 Compliance is a One-Way Ticket to Audit Hell PCI DSS v4.0 Cryptographic Requirements
    PCI DSS v4.0QryptoCyber Cryptographic Discovery and InventoryRequirement 12.3.3

    Why Using Excel for PCI DSS 12.3.3 Compliance is a One-Way Ticket to Audit Hell

    • 1
    • 2
    • 3
    • Next

    (415) 862-4235

    [email protected]

    QryptoCyber® Services and License Agreement

     

    GET A DEMO CONTACT US
    Close Menu
    • HOME
      • The 101: Don’t Look Up
    • PRODUCTS
      • Cryptographic AI²: AI Cryptographic Inventory & Management
      • The Five Pillars of Cryptographic Discovery & Inventory
      • Pillar I: External Networks
      • Pillar II: Internal Networks
      • Pillar III: IT, IoT & OT Assets
      • Pillar IV: Databases
      • Pillar V: Code
      • COAR (Cryptographic Orchestration, Automation, and Remediation)
      • PCI DSS 4 | 12.3.3
    • SERVICES
      • Cryptographic Inventory Workshop Exercise
      • Cryptographic Inventory Simulation
    • SOLUTIONS
      • Quantum Computing Impact on MITRE ATT&CK Techniques
      • Quantitative Quantum Risk Assessments
      • PCI DSS Requirement 12.3.3
      • Quantum Zero Trust
      • Quantum-Readiness: Cryptographic Inventory
    • COMPANY
      • WHY US
      • SUPPORT
      • BLOG
    • CONTACT US
    [contact-form-7 id="1" title="Main Contact Form"]