Reading view

There are new articles available, click to refresh the page.

MS-DEFCON 4: Is Secure Boot fixed?

ISSUE 23.17.1 • 2026-04-28 By Susan Bradley The April updates continue to dribble out more fixes for Secure Boot certificates for some systems. But once you receive the April updates, you still may be waiting for the new certs to be installed. That happened to me on some systems. Nonetheless, the patching world is relatively […]

More information from Microsoft about Secure Boot!

PATCH WATCH By Susan Bradley One of my complaints on behalf of consumers is that information about the new security certificates for Secure Boot has been vague — nearly hidden. Unless you are an AskWoody reader, you might not even be aware that there is an issue with Secure Boot certificates — not to mention […]

Understanding the nuances of Secure Boot

ISSUE 23.12 • 2026-03-23 PATCH WATCH By Susan Bradley Secure Boot continues to be confusing — and sometimes alarming. Nevertheless, here’s some reassurance for consumers and home users: For the most part, you can ignore all this Secure Boot patching advice. Your computer will boot if you get the update. Your computer will boot if […]

A little weak on being right

ISSUE 23.11.1 • 2026-03-19 By Will Fastie Great care must be taken when conversing with AI bots. In what can only be a galactic coincidence, I corresponded with two people this past Monday, both of whom had chatted with bots. One was an 87-year-old Plus member with a long background in technology and the other […]

It’s time to get serious about post-quantum security. Here’s where to start.

After decades of development, quantum computing is now becoming increasingly available for advanced scientific and commercial use. The potential marvels range from accelerating drug discovery and materials science, to optimizing complex logistics and financial modeling.

But there’s a paradox to this trend: Quantum computing also poses a growing threat to data security.

The risk is that the algorithms and protocols currently used to secure devices, applications and computer systems could eventually be broken by malicious actors using quantum computing, compromising even the strongest security measures. By some estimates, widely used encryption standards such as RSA and ECC could be cracked by quantum computers as soon as 2029—a doomsday known as “Q-Day,” when current security standards would be rendered ineffective by quantum computing’s number-calculating prowess.

The possibility that quantum computing could break today’s data protection protocols is prompting chief security officers and chief technology officers to ramp up countermeasures. They’re doing it with post-quantum cryptography (PQC), a niche area of cybersecurity that is rising in priority across the business world. Lack of preparedness could be costly, with one report putting the potential U.S. economic cost of a quantum attack at more than $3 trillion. Even before that potential calamity, the current average cost of a data breach is upwards of $10 million, and that number will only increase commensurate to the scale of a quantum-induced breach.

That is why the quantum threat should not be treated as a concern only for forward-thinking executives. It must become a board-level issue for every enterprise. Organizations should launch a comprehensive PQC initiative that builds enterprise-wide awareness and updates digital systems and data assets to be resilient against quantum attacks.

Waiting until Q-Day would be mistake because people will not know when it occurs. It probably will not arrive with press releases or product announcements. Instead, in may unfold quietly as attackers try to maximize what they can steal before anyone notices. The reality is that sensitive data is already at risk of being stolen and stored away so it can be decoded – an attack referred to as “harvest now, decrypt later”- when Q-Day is a reality. Security pros need to give this immediate attention, even if the ultimate threat appears to be a few years away.

Quantum-proofing data at scale

Security teams are usually focused on immediate threats, but they still have a window of opportunity to prepare for Q-Day, as long as they start now. 

One interim measure underway is the transition to more robust versions of the digital certificates and keys that are already pervasive in business and everyday life. Such certificates, which act as identity credentials, are used to authenticate billions of users, devices, documents and other forms of communications and endpoints. The certificates contain cryptographic keys. Security teams are phasing in “47-day keys,” which are designed to expire and be replaced within 47 days—much more frequently than the current generation. It’s a step in the right direction, but not enough.

Establishing a hardened PQC defense requires much more than a standard software patch or upgrade to the public key infrastructure (PKI) used most everywhere to manage digital certificates and encrypt data. An enterprise-wide PQC strategy must be adopted and implemented at scale.

Consider the rapid rise of agentic AI, where organizations may need to assign digital identities to thousands or even millions of AI agents. That will require a level of authentication that goes well beyond existing infrastructure.

These projects will be led by the CISO but planning and execution should include other business leaders because post-quantum security must reach every part of the organization’s digital environment. Boards also need to be involved, given the governance stakes and the significant capital investment required. 

Developing a multi-year, multi-pronged strategy

Organizations in regulated industries—banking, healthcare and government, for example—are generally a step ahead in bracing for the post-quantum threat. Regardless of industry, though, few are fully prepared because readiness requires a detailed picture of an organization’s end-to-end data and security landscape.

In my experience, that holistic view is a rarity. For CISOs and their line-of-business colleagues, a good starting point is creating a comprehensive inventory of systems and data across the enterprise, then prioritizing what needs to be safeguarded.

Another important step is to begin testing and adopting the latest quantum-resistant algorithms and protocols that have been standardized by NIST. A growing range of PKI products and platforms support those specifications. That’s essential because the only way enterprises will be able to orchestrate, monitor and manage the scope of deployment is through automation.

Such updates are vital, but this isn’t a matter of simply replacing pre-quantum specs with newer ones. Because PQC will be a multi-year undertaking, organizations must bridge the gap between old and new. The best strategy for some will be a hybrid approach that combines classical cryptography and next-gen algorithms, though standardization remains a work in progress. Other organizations are driving toward a “pure” or unblended post-quantum model.

As for those harvest attacks, the best defense is straightforward: Encrypt your most sensitive long-lived data with quantum-resistant algorithms ASAP.

PQC is a shared responsibility

Unfortunately, there is no finish line in the race to quantum-era security. And even if an organization locks down its systems against emerging threats, there’s no guarantee that customers and business partners will do the same.

 Many vulnerabilities will still remain, which is why the business case for PQC includes protecting customer data and safeguarding reputation and brand trust as digital threats evolve quickly. Even today, a major breach can cost millions and inflict lasting damage to a corporate brand.

Quantum computing promises to bring many new capabilities to business and society—from transforming supply chain optimization and risk analysis, to enabling breakthrough discoveries in medicine and climate science. But the potential risks are just as substantial. After years of watching and waiting for quantum, business leaders have little choice but to take action.

Chris Hickman is the chief security officer of Keyfactor, a leading provider of quantum-safe security solutions. 

The post It’s time to get serious about post-quantum security. Here’s where to start. appeared first on CyberScoop.

MS-DEFCON 2: March updates on the horizon

ISSUE 23.09.1 • 2026-03-05 By Susan Bradley For once, I don’t anticipate any issues with the forthcoming March updates. Nonetheless, I’ve raised the MS-DEFCON level to 2. It’s always wise to pause updates until thorough examinations are made and any bugs have been worked out. A little patience goes a long way. I’m excited by […]

Jumping back into the patching waters

PATCH WATCH By Susan Bradley If you are a bit timid about February’s patches and not looking forward to installing them, I don’t blame you. The last few months have been bumpy, to say the least. But neither I nor the five Windows 11 and two Windows 10 machines at my house, the one Windows […]

Securing Secure Boot

ON SECURITY By Susan Bradley The idea behind Secure Boot is that attackers can’t gain access to your system through the boot process. As Microsoft puts it in a support post: Secure Boot is a security feature in Unified Extensible Firmware Interface​ (UEFI) based firmware that helps ensure that only trusted software runs during a […]

Windows 10 Extended Security Updates begin

ISSUE 22.45.1 • 2025-11-13 PATCH WATCH By Susan Bradley This is the first month for updates from the Windows 10 Extended Security Updates (ESU) plan. If you’ve signed up for the ESU, you should start seeing them as you would have seen any updates in the past. But that doesn’t mean you should install them […]

MS-DEFCON 2: The first month of ESU

ISSUE 22.44.1 • 2025-11-06 By Susan Bradley This month marks the first time that security updates will be released to Windows 10 under Microsoft’s Extended Security Update program. If you’ve enrolled in the ESU plan, you should see them offered in Windows Update. But that does not mean you should install them now. Nothing has […]

Certificate Transparency Means What, Again?

Brian King // News from Google this week says that Chrome will start enforcing Certificate Transparency a year from now. https://groups.google.com/a/chromium.org/forum/#!topic/ct-policy/78N3SMcqUGw This means that when Chrome contacts a website, if […]

The post Certificate Transparency Means What, Again? appeared first on Black Hills Information Security, Inc..

TLS Certificates from EAP Network Traffic

Joff Thyer // A network can authenticate a client workstation using the 802.1X and Extensible Authentication Protocol (EAP) using multiple different methods.  EAP is used both in a wired network […]

The post TLS Certificates from EAP Network Traffic appeared first on Black Hills Information Security, Inc..

❌