Skip to main content
Hit enter to search or ESC to close
Close Search
QryptoCyberQryptoCyberQryptoCyberQryptoCyber
Menu
  • HOME
    • The 101: Don’t Look Up
  • PRODUCTS
    • Cryptographic AI²: AI Cryptographic Inventory & Management
    • The Five Pillars of Cryptographic Discovery & Inventory
    • Pillar I: External Networks
    • Pillar II: Internal Networks
    • Pillar III: IT, IoT & OT Assets
    • Pillar IV: Databases
    • Pillar V: Code
    • COAR (Cryptographic Orchestration, Automation, and Remediation)
    • PCI DSS 4 | 12.3.3
  • SERVICES
    • Cryptographic Inventory Workshop Exercise
    • Cryptographic Inventory Simulation
  • SOLUTIONS
    • Quantum Computing Impact on MITRE ATT&CK Techniques
    • Quantitative Quantum Risk Assessments
    • PCI DSS Requirement 12.3.3
    • Quantum Zero Trust
    • Quantum-Readiness: Cryptographic Inventory
  • COMPANY
    • WHY US
    • SUPPORT
    • BLOG
  • CONTACT US
    All Posts By

    Jeffrey Duran

    Jeffrey Duran has over 30 years of leadership in marketing and entrepreneurship, including 14 years in cybersecurity. He has been featured in prominent publications like Dark Reading and Verizon’s Data Breach Investigation Report. Jeff’s marketing strategies have driven startups like Invotas and enSilo, and major entities like Army Cyber Command and Verizon. A 35-year U.S. Army veteran, he integrates veterans into cybersecurity roles. Currently a Fractional CMO, he also serves on advisory boards and has won numerous awards for his communication skills.

    Quantum Threat to RSA: The Impending End of RSA and Public Key Encryption Organizations must proactively prepare for the quantum era by adopting quantum-resistant encryption methods and updating their cryptographic policies.
    Cryptanalytically Relevant Quantum Computers (CRQC)National Security Memorandum/NSM-10Prioritized Inventory of Cryptographic SystemsQryptoCyber Cryptographic Discovery and InventoryQuantum Safe CybersecurityQuantum-Safe Cybersecurity

    Quantum Threat to RSA: The Impending End of RSA and Public Key Encryption

    Crypto Agility: Any data, Any protocol, Any time Crypto agility refers to an organization's ability to quickly adapt and update its cryptographic systems in response to new threats, vulnerabilities, or technological advancements.
    Crypto AgilityQryptoCyber Cryptographic Discovery and InventoryQuantum Safe CybersecurityQuantum Zero Trust

    Crypto Agility: Any data, Any protocol, Any time

    Importance of Cryptographic Inventory to Quantum Threats As we edge closer to the advent of quantum computing, the need for a comprehensive cryptographic inventory has never been more pressing.
    Cryptographic DiscoveryCryptographic InventoryNational Security Memorandum/NSM-10Prioritized Inventory of Cryptographic SystemsQryptoCyber Cryptographic Discovery and Inventory

    Importance of Cryptographic Inventory to Quantum Threats

    Crypto Agility: The Future-Proof Strategy for Quantum-Safe Cybersecurity In the face of quantum computing and evolving cyber threats, crypto agility is a future-proof strategy that ensures robust and resilient cybersecurity.
    Crypto AgilityQryptoCyber Cryptographic Discovery and InventoryQuantum Safe CybersecurityQuantum Zero Trust

    Crypto Agility: The Future-Proof Strategy for Quantum-Safe Cybersecurity

    Preparing for the Quantum Apocalypse: Farewell RSA, Hello New World Say goodbye to RSA and public key encryption
    Cryptanalytically Relevant Quantum Computers (CRQC)Crypto AgilityNational Security Memorandum/NSM-10Prioritized Inventory of Cryptographic SystemsQuantum Zero Trust

    Preparing for the Quantum Apocalypse: Farewell RSA, Hello New World

    Why You Absolutely Need Crypto Agility
    Crypto AgilityCryptographic DiscoveryCryptographic InventoryQryptoCyber Cryptographic Discovery and Inventory

    Why You Absolutely Need Crypto Agility

    Understanding Cryptographic Inventory: A Short Take Cryptographic inventory is not just a best practice but a necessity in the face of quantum computing.
    Cryptographic DiscoveryCryptographic InventoryQryptoCyber Cryptographic Discovery and Inventory

    Understanding Cryptographic Inventory: A Short Take

    • Previous
    • 1
    • 2
    • 3

    (415) 862-4235

    [email protected]

    QryptoCyber® Services and License Agreement

     

    GET A DEMO CONTACT US
    Close Menu
    • HOME
      • The 101: Don’t Look Up
    • PRODUCTS
      • Cryptographic AI²: AI Cryptographic Inventory & Management
      • The Five Pillars of Cryptographic Discovery & Inventory
      • Pillar I: External Networks
      • Pillar II: Internal Networks
      • Pillar III: IT, IoT & OT Assets
      • Pillar IV: Databases
      • Pillar V: Code
      • COAR (Cryptographic Orchestration, Automation, and Remediation)
      • PCI DSS 4 | 12.3.3
    • SERVICES
      • Cryptographic Inventory Workshop Exercise
      • Cryptographic Inventory Simulation
    • SOLUTIONS
      • Quantum Computing Impact on MITRE ATT&CK Techniques
      • Quantitative Quantum Risk Assessments
      • PCI DSS Requirement 12.3.3
      • Quantum Zero Trust
      • Quantum-Readiness: Cryptographic Inventory
    • COMPANY
      • WHY US
      • SUPPORT
      • BLOG
    • CONTACT US
    [contact-form-7 id="1" title="Main Contact Form"]