温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/blog/from-urgency-to-action-why-post-quantum-cryptography-cant-wait
点击访问原文链接

From Urgency to Action: Why Post-Quantum Cryptography Can’t Wait | SSH

From Urgency to Action: Why Post-Quantum Cryptography Can’t Wait | SSH About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers July 22, 2025 From Urgency to Action: Why Post-Quantum Cryptography Can’t Wait Written by: Alina Preda Quantum computing is no longer just a theoretical threat looming on the distant horizon. As research accelerates and cryptographically relevant quantum computers inch closer to reality, the window to prepare is narrowing fast. The transition to post-quantum cryptography (PQC) is one of the most significant shifts the cybersecurity industry has ever faced — and the time to act is now. 

In a recent SSH Communications Security and HANDD Business Solutions webinar, the experts break down what makes PQC so urgent, why migration is complex, and how organizations can begin preparing today. Let’s find out.  

The Cryptographic Threat Is Already Here  According to Suvi Lampila, SSH Fellow and PQC expert, the potential of quantum computers to break current encryption has been known for decades: 

“We’ve known this since the 90s — the problem was, nobody believed we’d be able to build quantum computers capable of doing this. That changed around 2019.” 

 As Suvi pointed out, the U.S. National Institute of Standards and Technology (NIST) launched its PQC standardization project back in 2015 — highlighting that governments and leading cryptographers have taken this threat seriously for years. 

Yet many organizations still view PQC as a future problem. Suvi warns this mindset is dangerous: 

“The idea of ‘post’-quantum cryptography makes it sound like something far off. But the reality is, the clock has been ticking for a while now. Some data needs to remain confidential for decades — and it’s already being harvested today, to be decrypted later.” 

PQC Migration: A Technical and Organizational Challenge   Moving to quantum-safe encryption is not just a matter of swapping one algorithm for another. Juuso Jahnukainen, Technical Product Manager at SSH, emphasized that understanding the complexity of existing infrastructure is step one: 

“You need to know what you’ve got before you can start fixing it. Encryption can live in so many layers — centralized systems are easier to upgrade, but embedded firmware, hardware-level encryption, and hard-coded algorithms make it incredibly difficult. Sometimes, it’s even impossible without replacing the hardware.” 

The scale of the challenge is especially daunting in large organizations: 

“It’s about knowing where your web servers are, what protocols they use, and how those are configured. But PQC migration isn’t just about TLS. If you want full PQC coverage across all your systems and assets, that’s where things get really complicated.” 

Collaboration Is Critical  No single organization can handle this migration alone. As Suvi noted: 

“This is the biggest transition we’ve ever done in cryptography. If you were involved in previous migrations — like SHA-1 to SHA-2 — those were just practice runs. This is the real thing.” 

She stressed the importance of working with technology partners, industry alliances, and government stakeholders to ensure that efforts are aligned — from standards adoption to implementation. 

What Should Organizations Do Today?  Start inventorying cryptographic assets — know where and how encryption is used across your systems.  Evaluate vendor roadmaps — are your partners planning for PQC?  Join industry conversations — align with standards bodies and peer organizations.  Act now for long-term protection — especially for data that must remain confidential for years or decades.  Want to hear more from the experts?   Watch the full webinar for detailed insights from Suvi Lampila, Juuso Jahnukainen, and Sam Malkin, Lead Solutions Architect at HANDD Business Solutions. Learn what steps your organization can take today to begin its post-quantum cryptography journey — and why waiting is no longer an option. 

 

Watch the full webinar here >>> 

 

Tag(s): Post-Quantum Cryptography , PQC Alina Preda Alina is SSH’s Marketing Coordinator in the EMEA region, wielding over 7 years of experience as a journalist and content writer across various domains. In 2023, she shifted her focus from media to cybersecurity, where she continues to bring stories to life, craft compelling narratives, and bridge connections.

Other posts you might be interested in Post-Quantum Cryptography 7 min read | June 10, 2025 Why It’s Time to Use Post-Quantum Cryptography (PQC) — And How We Help You Get There Read More Quantum Computing Threats 14 min read | September 19, 2025 How Quantum Computing Threats Impact Cryptography and Cybersecurity Read More UKM 14 min read | January 18, 2023 SSH in the World of Post-Quantum Cryptography (PQC) Read More Subscribe to email updates SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录