
Preparing a Security Strategy for a Post-Quantum World with Greg Wetmore, Vice President of Product Development at Entrust
Modern CTO
Entrust's Interest in Cryptography
There are some very specific use cases where people like the NSA have said, hey, you might want to think about doing this now. The other use case we talk about is a threat we call harvest now decrypt later. Think about all of the secure information that's traveling over networks today over the internet or wide area networks. That stuff's probably encrypted, hopefully, but a sophisticated adversary could be scooping that up and saving it for 10 years from now.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.