Executive Summary: Advancements in quantum computing threaten existing cryptographic protections. While CRQCs aren’t expected imminently, organizations must proactively transition to quantum-safe cryptography to secure future communications. This article: Introduction Recent advancements in quantum computing pose a substantial threat to the cryptographic algorithms that secure internet communications, particularly public key cryptography. As quantum computers evolve, they could…Continue Reading: Post-quantum cryptography for Internet and WebPKI: Where are we now and how do you prepare?
PKI
Red Sift becomes the recommended certificate monitoring service of Let’s Encrypt
We’re thrilled to announce that Red Sift Certificates Lite has become the official recommended certificate expiration monitoring service of Let’s Encrypt, the world’s most widely used Certificate Authority. Red Sift Certificates Lite is a free service that allows users to track up to 250 certificates with email notifications 7 days ahead of expiry. It helps…Continue Reading: Red Sift becomes the recommended certificate monitoring service of Let’s Encrypt
A confident deployment guide for TLS and PKI
Our journey to better network transport security has been quite the ride, filled with ups and downs. Back in the ’90s, when SSL and the Netscape browser were just taking off, things were pretty hard. We were dealing with weak encryption, export restrictions on cryptography, and computers that couldn’t keep up. But over the years,…Continue Reading: A confident deployment guide for TLS and PKI