Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
News
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/0e/94/e9/0e94e970-bd41-a164-b784-bfe40af1a615/mza_11513504500373176126.jpg/600x600bb.jpg
The Encryption Edge
Encryption Consulting
18 episodes
6 days ago
The Encryption Edge delves into the practical world of applied cryptography, uncovering the technologies and strategies that protect our digital world. From exploring real-world implementations of cryptographic systems to breaking down the latest news and developments in the field, this podcast brings you a hands-on perspective of securing data and communications. Perfect for professionals, enthusiasts, and curious minds, The Encryption Edge ensures you're always one step ahead in the fast-evolving realm of cryptography.
Show more...
Technology
RSS
All content for The Encryption Edge is the property of Encryption Consulting and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Encryption Edge delves into the practical world of applied cryptography, uncovering the technologies and strategies that protect our digital world. From exploring real-world implementations of cryptographic systems to breaking down the latest news and developments in the field, this podcast brings you a hands-on perspective of securing data and communications. Perfect for professionals, enthusiasts, and curious minds, The Encryption Edge ensures you're always one step ahead in the fast-evolving realm of cryptography.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/42599502/42599502-1760621688333-24bd501011af2.jpg
Why the SHA-1 Disaster Holds the Key to Quantum Survival
The Encryption Edge
16 minutes 29 seconds
2 weeks ago
Why the SHA-1 Disaster Holds the Key to Quantum Survival

We dive into the catastrophic organizational failures of the SHA-1 to SHA-2 migration, revealing why enterprises missed hidden certificates and suffered dependency shock. This historical scramble offers urgent lessons for the PQC transition. Learn how the "Harvest Now, Decrypt Later" (HNDL) threat necessitates immediate action, necessitating C-suite leadership, extensive PKI overhauls, and mandatory crypto-agility to counter quantum computers and meet the non-negotiable 2031 deadlines. 

The Encryption Edge
The Encryption Edge delves into the practical world of applied cryptography, uncovering the technologies and strategies that protect our digital world. From exploring real-world implementations of cryptographic systems to breaking down the latest news and developments in the field, this podcast brings you a hands-on perspective of securing data and communications. Perfect for professionals, enthusiasts, and curious minds, The Encryption Edge ensures you're always one step ahead in the fast-evolving realm of cryptography.