Quantum hurdles: an optimistic view of post-quantum security
35:43
Sander Dorigo (Fox Crypto) - Presentation from SECCON NL 2022
Related Videos
In Security
-
Play video Birla Opus Paints - Connected Factories, Smarter Paint
Birla Opus Paints - Connected Factories, Smarter Paint
Birla Opus Paints built six new factories with one digital backbone, achieving speed, security, and resilience through Cisco-powered connected operations.
1:47
-
Play video Securing the Skies: How Wipro Safegaurds a Leading Airline
Securing the Skies: How Wipro Safegaurds a Leading Airline
Watch this aviation success story video on how Wipro, Cisco Secure Access and Google Chrome Enterprise Premium work together to deliver a secure way to access private applications from anywhere.
2:36
-
Play video Cisco SASE: End-to-end. Everywhere.
Cisco SASE: End-to-end. Everywhere.
This video shows how Cisco SASE unifies network architecture and security policy, optimizing user experience and IT efficiency to accelerate zero trust security.
1:05
-
Play video Cisco Secure Firewall 6100 Series Overview
Cisco Secure Firewall 6100 Series Overview
The Cisco Secure Firewall 6100 Series is an ultra-high-end series firewall that protects AI-ready data centers and telecom mobility infrastructure with exceptional performance density, line-rate advanced threat protection, and modular scalability.
1:14
-
Play video Cisco Hybrid Mesh Firewall - Hypershield
Cisco Hybrid Mesh Firewall - Hypershield
Protect your applications wherever they live This highly distributed security fabric with unified management is optimized for zero-trust segmentation and application protection in data center, cloud, campus, and IoT environments.
1:57
-
Play video Universal ZTNA from Cisco: Zero Friction. Zero Imposters. Zero Downtime.
Universal ZTNA from Cisco: Zero Friction. Zero Imposters. Zero Downtime.
Today, zero trust is the new normal. You get the least access to get the job done; nothing more. It sounds easy, but it’s not. Users and things are everywhere. Accessing sensitive assets, on any device, from anywhere. But so are attackers.
1:40