Quantum hurdles: an optimistic view of post-quantum security
35:43
Sander Dorigo (Fox Crypto) - Presentation from SECCON NL 2022
Related Videos
In Security
-
Play video Cisco SecureX End of Life Part 2 - Checkpoint Webinar Recording
Cisco SecureX End of Life Part 2 - Checkpoint Webinar Recording
On Aug. 11, 2023, Cisco announced the End of Life and End of Support of Cisco SecureX. This March 07 2024, checkpoint webinar features an update on our journey to define and implement transition options from SecureX.
37:35
-
Play video Cisco SecureX End of Life Part 3 - Secure Client Management Transition Experience Webinar Recording
Cisco SecureX End of Life Part 3 - Secure Client Management Transition Experience Webinar Recording
The final webinar in the series features a presentation and demo of the new Secure Client Management experience after the SecureX End of Life. It also summarizes the transition paths for other SecureX functionalities shared in prior webinars.
34:48
-
Play video Cisco Secure Firewall: Intelligent Security Powered by Talos
Cisco Secure Firewall: Intelligent Security Powered by Talos
In this presentation, Cisco dives into the ever-evolving role of the firewall and its enduring significance within the framework of a robust security strategy.
27:04
-
Play video Transitioning to Secure Client from SecureX
Transitioning to Secure Client from SecureX
This brief demo explains how Secure Client transitions into a stand-alone application that will transfer existing orgs and data from SecureX at the End of Life of SecureX on July 31, 2024.
6:31
-
Play video Cisco Cloud Application Security demo
Cisco Cloud Application Security demo
Cisco Cloud Application Security offers a unified view of cloud assets to visualize, prioritize, and remediate risks. Graph-based attack path analysis and AI-powered remediations simplify issue resolution. Let’s see this functionality in action.
1:43
-
Play video Cisco XDR Detection Analytics and Gen AI
Cisco XDR Detection Analytics and Gen AI
In this session, our experts unpack the sophisticated mechanisms behind Cisco XDR's ability to swiftly detect and correlate threats.
32:35