QuSecure Named In The Architect’s Guide to Quantum Security
Stay ahead with the latest insights on quantum security, crypto-agility, and cybersecurity innovation—straight from our team of experts.
Latest Articles
Date
Title
Read Time
The Secret History of Cryptographic Evolution: NSA Influence, Algorithm Transitions, and the Road to Post-Quantum Security
Quantum Networks and Post-Quantum: QuSecure’s Garfield Jones at the Forbes CIO Summit
See
in Action
Previous Articles
Dive into our previous thought leadership content, packed with actionable insights and industry trends.
By Helena Handschuh For as long as most of us in the cryptographic community can remember, the National Security Agency (NSA) has occupied a unique and sometimes misunderstood role in shaping the world’s cryptographic standards. Its influence has often sparked
At the Forbes CIO Summit, QuSecure’s Garfield Jones outlines why CIOs must act now on quantum threats This week at the Forbes CIO Summit, QuSecure’s new SVP of Research and Technology Strategy Garfield Jones joined technology leaders from Lockheed Martin
QuSecure Expands Leadership Team with Appointment of Garfield Jones, Former Associate Chief of Strategic Technology for U.S. CISA at Department of Homeland Security Veteran cybersecurity leader to drive strategy and product innovation to deliver cutting-edge solutions that meet customers’ evolving
September 2 Dave Krauthamer is the field CTO and a board member at QuSecure. For more than two decades, large corporations have woven cryptographic functions directly into the fabric of their applications, believing that vendor-supplied encryption would safeguard data indefinitely.
September 2 Security providers add leadership across functions, including marketing, revenue, and more QuSecure names Jennifer Leggio as SVP of marketing and revenue operations QuSecure, a leader in post-quantum cryptography (PQC) and cryptographic agility, welcomed Jennifer Leggio as SVP of
September 2 Jennifer Leggio, SVP of Marketing and Revenue Operations at QuSecure, focusing on the importance of modernizing encryption practices in light of quantum computing. She explains how quantum computing differs from traditional methods and poses risks to current encryption.