How Do We Re-Encrypt the World?

How Do We Re-Encrypt the World?

Hot Content 

Podcast: The Race to Re-encrypt the World Before Q-Day - Your Top Questions Answered 


This Month 

The Cybersecurity Challenges of Re-Encrypting the World 

The world as we know it today depends on strong encryption. Encryption underpins our trust and is the foundation for everything we do online. However, new developments in cyber threats and attacks, combined with the acceleration of technologies like generative AI, threaten to dismantle modern encryption methods – and the digital environment that relies on it.  

“Re-encrypting the world” is more than a slogan. It requires organizations to reassess their security posture and prioritize robust encryption standards that can mitigate the cyber threats of today – while anticipating those just around the corner. 

This month, we focus on the evolution of encryption and the risks that come with it. From re-securing software supply chains, to preparing for the arrival of quantum computers and transitioning to post-quantum cryptography (PQC), learn how organizations can strengthen and reinforce cybersecurity strategies as we enter a new era of encryption. 


Institute Feature 

Podcast Episode: The Race to Re-encrypt the World Before Q-Day - Your Top Questions Answered 

As the advent of quantum computing draws nearer, the cybersecurity landscape is poised for a significant transformation – and risk. When it arrives, quantum computing will break the conventional encryption algorithms that protect our digital universe today. And this risk is already a reality with many threat actors conducting “Harvest Now, Decrypt Later” style attacks that target long-life data or devices.  

While experts vary on the exact date of widespread quantum computing, also known as Q-Day or Y2Q, there is no doubt that the pace of quantum development is accelerating. With bad actors anxiously awaiting the arrival of commercially viable quantum computers and the post-quantum era on the horizon, the time to re-encrypt the world is now. 

To address this daunting issue, in this podcast episode, Entrust’s Chief Information Officer, Rishi Kaushal, and Director Cryptographic Data Security Solutions, Samantha Mabey, discuss the key challenges associated with the arrival of Q-Day, what is needed to attain and maintain a Zero Trust strategy in the post-quantum era, how organizations can assess post-quantum cryptography (PQC) readiness, and some of the best practices to facilitate the cryptographic transition to PQC. 

Listen Now 


More Institute Insights 

Blog Post: How Many Cyber Threats Are Lurking in Your Supply Chain? 

It’s been nearly five years since the notorious SolarWinds and Log4j cyber-attacks showed the world how bad actors could use exposures in software supply chains to exploit and compromise millions of systems and accounts globally. And yet, software supply chains today remain incredibly vulnerable to cyber threats. With cyber criminals taking note and an increase of 742% in software supply chain attacks over the past three years, it’s never been more important to understand the risks that software supply chains face – and what CISOs can do to identity supply chain vulnerabilities, assess their cyber risk posture, and proactively mitigate threats.   

To learn more about the most common software supply chain attack vectors and how to prevent the next SolarWinds or Log4j-like supply chain attack, read this blog post by Jenn Markey, Advisor to the Entrust Cybersecurity Institute. 

Read Blog Post 


Video: Navigating Changing Compliance Landscape 

Hear from Entrust CISO, Jordan Avnaim, as he explores navigating AI compliance and regulations, practicing good cybersecurity governance, and balancing external compliance and internal organizational dynamics. 

Watch Video 


The Stats  

Article content

Four in ten UK businesses (43%) and three in ten UK charities (30%) reported experiencing a cybersecurity breach within the last 12 months. Of those that experienced an attack, phishing remains the most dominant and disruptive type of cybersecurity breach. 

Source: Department for Science, Innovation and Technology (DSIT) and the Home Office 

Article content

Information security spending by Middle East and North Africa (MENA) enterprises is projected to top $3.3 billion in 2025. This reflects an increase of 14% spending since 2024. 

Source: Gartner 


About the Entrust Cybersecurity Institute 

The Entrust Cybersecurity Institute offers insights and education for IT and business leaders charged with protecting and growing their organizations. Learn more at entrust.com/cybersecurity-institute

Feedback? Talk to us at cybersecurityinstitute@entrust.com 

To view or add a comment, sign in

More articles by Entrust

Others also viewed

Explore topics