<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Johann Plüss, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/johann-pluss/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 16 Mar 2026 12:45:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Johann Plüss, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Radar 2026 of Post-quantum Migration Solutions </title>
		<link>https://www.riskinsight-wavestone.com/en/2026/03/radar-2026-of-post-quantum-migration-solutions/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/03/radar-2026-of-post-quantum-migration-solutions/#respond</comments>
		
		<dc:creator><![CDATA[Johann Plüss]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 17:18:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29391</guid>

					<description><![CDATA[<p>The Quantum Threat Is Becoming Clearer  Quantum computing poses a serious threat to today’s asymmetric cryptography and is expected to render widely used algorithms such as RSA and ECC obsolete. By contrast, symmetric cryptography (such as AES) and hash functions, maintaining an equivalent level of security...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/radar-2026-of-post-quantum-migration-solutions/">Radar 2026 of Post-quantum Migration Solutions </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1>The Quantum Threat Is Becoming Clearer </h1>
<p><span data-contrast="auto">Quantum computing poses a serious threat to today’s asymmetric cryptography and is expected to render widely used algorithms such as RSA and ECC obsolete. By contrast, symmetric cryptography (such as AES) and hash functions, maintaining an equivalent level of security can be achieved by increasing key sizes or security parameters.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">In response to this emerging risk, the NIST standardized four post-quantum asymmetric algorithms in August 2024, specifically designed to withstand attacks from quantum computers.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">While quantum computers are not yet powerful enough to carry out such attacks, estimates vary as to when this capability will be reached, with many experts anticipating a timeframe between 2033 and 2037.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Nevertheless, the “Harvest Now, Decrypt Later” (HNDL) threat—where attackers collect encrypted data today with the intent of decrypting it in the future using quantum computers—makes it critical to protect sensitive, long-lived data well before such machines become operational.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>2025: Regulatory Acceleration </h1>
<p><span data-contrast="auto">While 2024 marked the completion of technical standards with the publication of the NIST specifications, 2025 stands out for the acceleration of institutional and regulatory roadmaps. In recent months, several major stakeholders have released their recommendations:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">The </span><a href="https://digital-strategy.ec.europa.eu/en/library/coordinated-implementation-roadmap-transition-post-quantum-cryptography"><b><span data-contrast="none">European Union</span></b></a><span data-contrast="auto"> has defined a roadmap for Member States and entities subject to NIS 2</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><a href="https://www.gov.uk/government/publications/advancing-a-coordinated-roadmap-for-the-transition-to-post-quantum-cryptography-in-the-financial-sector/g7-cyber-expert-group-statement-on-advancing-a-coordinated-roadmap-for-the-transition-to-post-quantum-cryptography-in-the-financial-sector-january-20"><b><span data-contrast="none">G7 Finance</span></b></a><span data-contrast="auto"> has formally integrated the post-quantum transition into its priorities</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">The </span><a href="https://www.bis.org/publ/bppdf/bispap158.htm"><b><span data-contrast="none">Bank for International Settlements (BIS)</span></b></a><span data-contrast="auto"> has raised awareness within the banking sector</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">The </span><a href="https://www.ncsc.gov.uk/guidance/pqc-migration-timelines"><b><span data-contrast="none">UK government</span></b></a><span data-contrast="auto"> has published its national post-quantum roadmap</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><span data-contrast="auto">These announcements build on previously communicated timelines: the NIST released a draft targeting 2035, while the Australian Signals Directorate (ASD) set a 2030 deadline. We expect additional countries to issue similar announcements in the coming months.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">As a result, the post-quantum transition is no longer solely a technological challenge. It is becoming a regulatory and institutional imperative, comparable to past largescale digital transformations. Regardless of the exact timeline for the emergence of quantum computers capable of breaking current cryptographic algorithms, a transition is unavoidable.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Migrating a complex IT infrastructure is far from trivial. According to a 2022 memorandum, the Biden administration estimated the cost of migrating all U.S. federal agencies at over $7 billion. Such a program spans multiple dimensions—from risk assessment to technical execution—and involves numerous intermediate steps. Dedicated solutions already exist to support and accelerate each phase of this transition.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>The Wavestone Radar: A Market Overview of Solutions </h1>
<p><span data-contrast="auto">The 2026 Wavestone Radar of post-quantum migration solutions provides a visual overview of the leading solutions available on the market to support this transition. It has been—and will continue to be—regularly updated and enriched over the coming months. Any company that believes it should be featured is encouraged to contact us.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The objective of this radar is not to list solutions that have already completed their post-quantum transition, but rather to highlight those that actively support and accelerate the migration process.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img fetchpriority="high" decoding="async" class="size-full wp-image-29398 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1.png" alt="" width="1828" height="1032" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1.png 1828w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1-768x434.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1-1536x867.png 1536w" sizes="(max-width: 1828px) 100vw, 1828px" /></p>
<h1>Radar Categories </h1>
<p><span data-contrast="auto">Quantum Key Distribution (QKD) was considered but ultimately excluded as a category. While QKD is resistant to quantum computers, it is not technically a post-quantum cryptography technology and is not recommended by regulatory bodies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Inventory</span></b><span data-contrast="auto">: Automating the identification of all cryptographic assets, including the types of cryptography used and their locations</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><b><span data-contrast="auto">Network Analysis</span></b><span data-contrast="auto">: Detecting network traffic that relies on obsolete cryptography using network probes</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><b><span data-contrast="auto">Migration Management</span></b><span data-contrast="auto">: Providing an end-to-end view of the post-quantum transition, often based on inventory or network analysis results</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><b><span data-contrast="auto">PQC compliant HSM / PKI / CLM</span></b><span data-contrast="auto">: Delivering essential digital trust components for most services that are resistant to quantum attacks</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><b><span data-contrast="auto">Libraries / Embedded Services</span></b><span data-contrast="auto">: Encrypting and signing data using versatile cryptographic libraries or cloud integrated solutions</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><b><span data-contrast="auto">Perimeter Protection</span></b><span data-contrast="auto">: Adding an additional layer of security against quantum threats, notably through traffic encapsulation and application wrappers for critical systems</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<h1>Inventory: The Cornerstone of Any Migration </h1>
<p><span data-contrast="auto">Our initial feedback from supporting post-quantum migration programs highlights a clear reality: it is impossible to plan and budget a migration without visibility into the existing environment. </span><span data-contrast="auto">Concretely, organizations need to understand :</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">Which use cases and data are involved?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Where is cryptography used across the information system?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Which algorithms are currently deployed?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><span data-contrast="auto">Conducting an exhaustive inventory of a complex IT infrastructure represents a significant investment. It is therefore critical to prioritize the areas where inventory tools should be deployed first, based on three key criteria: data exposure (data accessible via the internet, exchanged with partners, etc.), long-term data sensitivity and vulnerability to HNDL attacks, and the technical components used to secure this data. Without this upfront visibility—understanding which algorithms are used, for which purposes, and to protect which data-effective migration planning becomes impossible.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">However, cryptographic inventory cannot rely on a single source. Organizations must combine multiple complementary approaches: network probes enable real-time observation of traffic, code analysis identifies cryptographic usage within applications and internal developments, SaaS specific tools and interfaces with external providers reveal third-party dependencies, while existing CMDBs and reference repositories map the overall infrastructure. This multiplicity of sources creates a new strategic need for tools capable of centralizing heterogeneous information and providing a consolidated, actionable view to effectively manage migration. A trend is emerging around the CBOM (Cryptography Bill of Materials) format to standardize these inventories, although it is still too early to assess its actual adoption across the market.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Inventory thus becomes the foundation of post-quantum migration governance. Without it, organizations are effectively navigating blind.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Since 2024, the market for digital asset inventory solutions has experienced strong growth, driven by the emergence of highly specialized players focused exclusively on the detection, mapping, and management of IT assets (hardware, software, cryptographic certificates, etc.). These vendors stand out for their deep expertise and ability to address complex environments.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">At the same time, established players in the network and infrastructure space – such as IBM, Samsung, Cisco, and Microsoft – are leveraging their deep knowledge of IT environments to deliver robust solutions. These offerings increasingly integrate advanced network probes and cryptographic inventory capabilities, with growing attention paid to post-quantum cryptography challenges.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>CryptoAgility: A Long Term Objective of the Post-quantum Transition </h1>
<p><span data-contrast="auto">Cryptoagility is not merely a technical feature; it is a strategic capability that enables organizations to adapt to cryptographic evolutions without operational disruption. As post-quantum cryptographic (PQC) algorithms increasingly become a regulatory standard, cryptoagility allows business logic to be decoupled from the underlying cryptography, thereby facilitating updates without requiring a complete overhaul of existing infrastructures.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">To adopt a crypto agile approach, organizations must embed flexible and scalable mechanisms from the design phase, capable of adapting to cryptographic advances—whether driven by the quantum threat or by the rapid deprecation of algorithms.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">On the library side, solutions offering a modular approach are now widely available. Tools such as </span><b><span data-contrast="auto">Open Quantum Safe (OQS)</span></b><span data-contrast="auto">, compatible with OpenSSL and BoringSSL, or </span><b><span data-contrast="auto">liboqs</span></b><span data-contrast="auto"> (Intel), optimized for x86 architectures, enable the integration of NIST standardized post-quantum algorithms (Kyber, Dilithium, SPHINCS+). </span><b><span data-contrast="auto">Bouncy Castle</span></b><span data-contrast="auto">, for its part, provides a unified API for Java and C#, easing the transition between classical and post-quantum cryptography.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">However, the modular approach offered by these libraries must be integrated into a broader ecosystem of specialized tools. In this context, inventory solutions and cryptographic key and certificate lifecycle management tools play a critical role. They enable the establishment of an exhaustive mapping of the cryptographic environment, providing full visibility into all assets that need to be protected. This comprehensive view forms an essential foundation for ensuring data security and implementing truly effective risk management.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Ultimately, crypto agility goes beyond the technical domain. It is a strategic capability that allows organizations to secure their data sustainably, reduce quantum related risks, and approach the future with greater confidence. The technological building blocks are already in place; what remains is to integrate them today into cybersecurity strategies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>Perimeter Protection: A Rapid Mitigation Strategy </h1>
<p><span data-contrast="auto">Given the scale and complexity of post-quantum migration programs, perimeter protection (edge protection) solutions provide a pragmatic and fast acting approach to reducing exposure across critical data flows.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">These solutions enable the rapid securing of sensitive communication channels—such as VPNs, email, and file transfers – by encapsulating traffic within a post-quantum cryptographic layer, without requiring changes to the underlying applications. This makes it possible to deploy wrappers around critical applications without waiting for their full redesign or migration.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The primary advantage of this approach lies in the significant time savings it delivers. While a comprehensive application-level migration remains necessary in the medium term and may span several years, perimeter protection offers immediate security for the most exposed assets. This strategy allows organizations to intelligently prioritize the protection of their most sensitive data, while methodically preparing for the broader, long-term migration of their IT infrastructure.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>HSMs and Certifications: A Turning Point in 2025 </h1>
<p><span data-contrast="auto">In the first version of our radar, we highlighted the lack of certifications for post-quantum Hardware Security Modules (HSMs), which represented a major barrier to their deployment in production environments.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">This situation has since evolved positively. Both the </span><a href="https://cyber.gouv.fr/actualites/pour-lanssi-la-cryptographie-post-quantique-post-quantum-cryptography-ou-pqc-repr%C3%A9sente-la-voie-la-plus-prometteuse-pour-se-pr%C3%A9munir-contre-la-menace-quantique-la-transition-post-quantique-repose-notamment-sur-la-mise-%C3%A0-disposition-pour-les-uti/"><b><span data-contrast="none">ANSSI</span></b></a><span data-contrast="auto"> and the </span><a href="https://www.infineon.com/press-release/2025/infcss202501-043"><b><span data-contrast="none">BSI</span></b></a><span data-contrast="auto"> have now issued three Common Criteria certifications for PQC compatible HSMs (from </span><b><span data-contrast="auto">Samsung</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">Thales</span></b><span data-contrast="auto">, and </span><b><span data-contrast="auto">Infineon</span></b><span data-contrast="auto">). These certifications mark a significant turning point and pave the way for real-world deployments under operational conditions.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">HSMs play a critical role in the digital trust chain, particularly for:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">The secure generation and storage of PQC keys, which are significantly larger than their classical counterparts</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><span data-contrast="auto">Signature operations within Public Key Infrastructures (PKIs)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><span data-contrast="auto">End-to-end key lifecycle management (rotation, revocation, archiving), ensuring integrity and traceability to maintain the chain of trust</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="auto">However, even when certified, these HSMs must still address challenges related to side channel attacks, given the relative immaturity of current implementations of these new algorithms. The scientific community continues to actively assess and analyze these risks.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>IoT and Embedded Systems: The Weak Link </h1>
<p><span data-contrast="auto">While the market for PQC solutions is progressing rapidly for traditional IT environments, a worrying gap is emerging for IoT and embedded systems. These devices operate under severe constraints – limited power, reduced processing capabilities, and restricted storage – which directly conflict with the requirements of post-quantum algorithms, inherently more resource intensive than their classical counterparts.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Deploying PQC on such systems often requires dedicated processors with optimized instruction sets. However, the current hardware ecosystem remains insufficient: few dedicated PQC hardware accelerators are available on the market, and hardware development cycles typically span several years. This technical complexity is compounded by the challenge of upgrading a highly decentralized and heterogeneous device landscape, including widely deployed and hard to access connected objects, mission critical industrial systems where downtime is costly, smart cards with long renewal cycles, and legacy equipment with limited or no update capabilities.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The risk is clear: a lasting gap could emerge between traditional IT environments, which will progressively migrate to PQC, and embedded IoT systems, which may remain vulnerable for a much longer period. Organizations must anticipate this challenge now by embedding PQC compatibility requirements into their specifications for all new deployments of embedded and connected equipment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>A Nuanced Market Outlook </h1>
<p><span data-contrast="auto">The market has now clearly acknowledged that the post-quantum transition will necessarily begin with a systematic inventory phase and a comprehensive risk assessment, a realization that has reshaped the structure of the ecosystem. This growing awareness is reflected in several encouraging developments: the proliferation of specialized solutions for mapping cryptographic assets; the first official certifications for PQC compatible security modules, confirming their readiness for operational deployment; and the maturity of opensource libraries, now widely supported by the industry. Migration support tools further complement this landscape. In parallel, perimeter security approaches already make it possible to protect sensitive data flows without waiting for a full system overhaul.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">However, this momentum continues to face persistent challenges. Delays in the development of suitable hardware – particularly for IoT and embedded systems – remain a major obstacle, with a still limited availability of low power, PQC compatible processors. Certifications, while promising, remain limited in number and cover only part of the available technological spectrum. Finally, inventory tools, despite becoming increasingly sophisticated, have yet to fully demonstrate their ability to effectively address the complexity and heterogeneity of large enterprise IT environments.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">As a result, while the market has clearly oriented its efforts toward inventory and risk analysis as essential prerequisites for migration, technological and industrial challenges continue to slow largescale adoption.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/radar-2026-of-post-quantum-migration-solutions/">Radar 2026 of Post-quantum Migration Solutions </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/03/radar-2026-of-post-quantum-migration-solutions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Johann Plüss]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 14:17:53 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity startups radar]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[radar 2025]]></category>
		<category><![CDATA[Swiss radar]]></category>
		<category><![CDATA[Switzerland]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26402</guid>

					<description><![CDATA[<p>AI at the service of cybersecurity: a concrete step forward   Every year since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. While AI has established itself as a cross-disciplinary subject in all fields, the 2025 Radar...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/">Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: justify;">AI at the service of cybersecurity: a concrete step forward</h2>
<p> </p>
<p style="text-align: justify;">Every year since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. While AI has established itself as a cross-disciplinary subject in all fields, the 2025 Radar focuses on the <strong>use of artificial intelligence as a tool</strong>, not just as a subject to be secured, but as a <strong>technology at the very heart of the cyber response.</strong></p>
<p style="text-align: justify;">Several startups are using AI to automate, enhance or personalize their solutions:</p>
<p style="text-align: justify;"><strong>Egonym</strong> uses generative AI to anonymize faces in images and videos while preserving useful traits like age and emotion — striking a rare balance between privacy and utility.</p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-26393" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image16.jpg" alt="egonym logo" width="155" height="53" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image16.jpg 155w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image16-71x24.jpg 71w" sizes="(max-width: 155px) 100vw, 155px" /></p>
<p style="text-align: justify;"><strong>Hafnova</strong> applies real-time AI to detect, block, and report threats across critical infrastructures with high responsiveness and minimal delay.</p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-26369" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png" alt="Hafnova logo" width="67" height="71" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2-37x39.png 37w" sizes="(max-width: 67px) 100vw, 67px" /></p>
<p style="text-align: justify;"><strong>Aurigin</strong> combats deepfake-based fraud in real time using multimodal AI that simultaneously analyzes voice, image, and text to validate identities. </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26395" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image17.jpg" alt="aurigin.ai logo" width="176" height="51" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image17.jpg 176w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image17-71x21.jpg 71w" sizes="auto, (max-width: 176px) 100vw, 176px" /></p>
<p style="text-align: justify;"><strong>RedCarbon</strong> delivers autonomous AI agents capable of handling complex cybersecurity tasks such as threat detection, hunting, and compliance monitoring — significantly reducing analyst workload.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26375" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image6-e1750428148421.png" alt="REDCARBON logo" width="183" height="24" /></p>
<p style="text-align: justify;"><strong>Baited</strong> leverages AI and OSINT to generate hyper-realistic phishing simulations, enabling organizations to test and train employees under real-world conditions.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26373" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image5-e1750428603602.png" alt="baited logo" width="142" height="45" /></p>
<p style="text-align: justify;">It&#8217;s good to see AI becoming an essential defensive weapon contributing to the defense of our information systems.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Strong momentum around threat detection, response and monitoring</h2>
<p> </p>
<p style="text-align: justify;">The second strong trend this year is the emergence or reinforcement of startups specializing in <strong>intrusion detection, suspicious behavior detection, incident response</strong> and <strong>continuous supervision.</strong></p>
<p style="text-align: justify;">This segment, already well established historically, is undoubtedly gaining strength with several new entries:</p>
<p style="text-align: justify;"><strong>RedCarbon</strong>: AI agents for threat detection &amp; automated hunting.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26375" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image6-e1750428148421.png" alt="REDCARBON logo" width="175" height="23" /></p>
<p style="text-align: justify;"><strong>Swiss Security Hub</strong>: continuous monitoring of SAP systems with XDR integration.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26377" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image7-e1750428038244.png" alt="Security Hub logo" width="115" height="115" /></p>
<p style="text-align: justify;"><strong>Cyberservices</strong> : XDR platform based on the Google ecosystem.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter  wp-image-26379" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image8-e1750428222485.png" alt="Cyberservices logo" width="64" height="35" /></p>
<p style="text-align: justify;"><strong>Hafnova</strong>: real-time cyber supervision in critical sectors.</p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-26369" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png" alt="Hafnova logo" width="67" height="71" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2-37x39.png 37w" sizes="(max-width: 67px) 100vw, 67px" /></p>
<p style="text-align: justify;"><strong>Tirreno</strong>: on-prem platform for online fraud detection with user trust scoring.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter  wp-image-26383" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image10-e1750428239189.png" alt="tirreno logo" width="131" height="29" /></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">At a time when cyber-attacks continue to increase in number and complexity, <strong>preventive, contextualized and autonomous detection</strong> is and will remain key to strengthening operational resilience.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;">New ground explored: digital sovereignty and secure hardware</h2>
<p> </p>
<p style="text-align: justify;">Among the notable additions, <strong>The Cosmic Dolphins</strong> stands out with its sovereign hardware approach:</p>
<p style="text-align: justify;"><strong>The Cosmic Dolphins</strong>: Swiss smartphones with dual-zone OS (Shark Zone / Dolphin Zone), kill switch, and hardware-first approach to privacy.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26385" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image11-e1750428264682.jpg" alt="The Cosmic Dolphins logo" width="99" height="99" /></p>
<p style="text-align: justify;">Swiss innovation isn&#8217;t limited to software: <strong>mastery of the physical infrastructure</strong> is becoming an issue of trust, sovereignty and differentiation.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26387" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12.jpg" alt="Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity" width="602" height="338" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12.jpg 602w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12-340x191.jpg 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12-600x338.jpg 600w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<h2 style="text-align: justify;">Key Figures</h2>
<h2 style="text-align: justify;" data-wp-editing="1"><img loading="lazy" decoding="async" class="aligncenter wp-image-26406 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image18-e1750429011414.png" alt="" width="200" height="39" /><br /><img loading="lazy" decoding="async" class="aligncenter wp-image-26408 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image19-e1750428988444.png" alt="" width="200" height="67" /></h2>
<p> </p>
<h2 style="text-align: justify;">Geographical focus: undisputed predominance of Lausanne and Zurich, but other regions are gaining ground</h2>
<p> </p>
<p style="text-align: justify;">Unsurprisingly, most startups are located around two main technological clusters: Zürich and Lausanne. This confirms an already existing trend since these two cities are hosting Swiss Federal institutes of technology (ETHZ in Zürich, EPFL in Lausanne).</p>
<p style="text-align: justify;">These universities are providing a fertile ground for startups as they offer support in terms of infrastructure but also in terms of collaboration with students and labs. In return, intellectual property is shared between startups and universities. This model is a success for Switzerland as it allows to continuously improve the economy of these regions with a good balance between investment and research.</p>
<p style="text-align: justify;">Nevertheless, other regions such as Geneva and Ticino are showing increasing dynamism, with several new startups emerging in this year’s edition. This points to a gradually diversifying ecosystem, supported by regional initiatives like innovation hubs and dedicated startup incubators.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Methodology</h2>
<p> </p>
<p style="text-align: justify;">Wavestone’s Swiss Cybersecurity Startups Radar identifies new players in the Swiss cyber innovation ecosystem. Its objective: to provide a global and critical view of an ever-renewing environment.</p>
<ul>
<li style="text-align: justify;">Startups were selected according to our eligibility criteria:</li>
<li style="text-align: justify;">Head office in Switzerland</li>
<li style="text-align: justify;">Less than 50 employees</li>
<li style="text-align: justify;">Less than 8 years of activity (established as of 2017)</li>
<li style="text-align: justify;">Business model around a specific product (software or hardware)</li>
<li style="text-align: justify;">Startups were identified and evaluated according to the following procedure:</li>
<li style="text-align: justify;">Open Source Intelligence (OSINT) data consolidation</li>
<li style="text-align: justify;">Evaluation in regard to above criteria</li>
<li style="text-align: justify;">Qualitative interviews with the startups</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/">Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/#respond</comments>
		
		<dc:creator><![CDATA[Johann Plüss]]></dc:creator>
		<pubDate>Mon, 17 Mar 2025 12:11:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[post-quantum]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25577</guid>

					<description><![CDATA[<p>What if your most sensitive data became accessible in an instant? The growing excitement about the advent of quantum computers is justified for a subject that is no longer science fiction but involves a new kind of threat. Indeed, according...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/">Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 style="text-align: justify;">What if your most sensitive data became accessible in an instant?</h3>
<p style="text-align: justify;">The growing excitement about the advent of quantum computers is justified for a subject that is no longer science fiction but involves a new kind of threat.</p>
<p style="text-align: justify;">Indeed, according to the predictions of numerous experts such as the <a href="https://globalriskinstitute.org/publication/2023-quantum-threat-timeline-report/">Global Risk Institute</a>, quantum computers should soon be capable of solving the mathematical problems underlying current cryptographic standards &#8211; which would consequently render obsolete the traditional systems protecting our communications, our finances and our critical infrastructures. </p>
<p style="text-align: justify;">For businesses, the urgent question is no longer whether this threat will become a reality, but when. How can we anticipate the operational and structural impact of this technological upheaval, while at the same time responding to the growing number of regulatory recommendations on the subject? What tools should be adopted to guarantee the confidentiality and integrity of data in the near future? It&#8217;s a major challenge, but solutions are being studied, such as post-quantum cryptography (PQC), which is already being widely adopted by the international community.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">The quantum threat</h2>
<p> </p>
<p style="text-align: justify;">Today, the security of information systems relies mainly on <strong>symmetric</strong> and <strong>asymmetric</strong> (or <strong>public</strong> <strong>key</strong>) cryptography and <strong>hash</strong> functions. These categories are represented by algorithms that are widely used today, in particular <strong>AES, RSA, ECC</strong> and <strong>SHA</strong> for <strong>hash</strong> functions. Massively adopted by the global community and natively integrated into many modern devices, these algorithms have proved their worth for decades in ensuring the confidentiality, authenticity and integrity of data exchanges.</p>
<p style="text-align: justify;">The mathematical problems on which these standards are based are <strong>sufficiently</strong> complex to ensure that even today&#8217;s best supercomputers have <strong>no brute-force</strong> capability.   </p>
<p style="text-align: justify;">The quantum computer is reshuffling the deck.</p>
<p style="text-align: justify;">These machines are based on <strong>physical</strong> principles that are fundamentally different from today&#8217;s classical computers. Thanks to the phenomena of <strong>superposition</strong> and <strong>entanglement</strong>, a quantum processor can process different physical states <strong>simultaneously</strong>. What is often described as ‘quantum parallelism’ does not correspond to simple classical parallel computing (where several cores execute identical tasks), but to the ability to explore <strong>multiple</strong> execution paths <strong>simultaneously</strong>. For some algorithms, this approach can considerably <strong>reduce</strong> the search space and <strong>speed up</strong> processing.</p>
<p style="text-align: justify;">A key question then arises<em>: are there already algorithms capable of exploiting these quantum properties, and thus of overcoming current encryption standards?</em></p>
<p style="text-align: justify;">In 1994, <strong>P. Shor</strong>, followed by <strong>L. Grover</strong> in 1996, introduced algorithms incorporating <strong>quantum computation</strong> processes to solve certain complex mathematical problems. The first <strong>allowed large numbers to be factored</strong> exponentially faster than a conventional algorithm, while the second optimised the <strong>search for an element</strong> in unordered sets. Until now, the characteristics of classical computers have made these algorithms impractical, but the emergence of quantum computers will radically change the situation, making them usable.</p>
<p style="text-align: justify;">Indeed, the best supercomputer would take <a href="https://www.eetimes.com/how-secure-is-aes-against-brute-force-attacks/?_ga">1.02 x 10¹⁸ years (one trillion years) to break <strong>AES-128</strong> by brute force</a> and <a href="https://www.digicert.com/faq/cryptography/what-is-ssl-cryptography"><strong>10¹⁰ years</strong> (10 billion years) for <strong>RSA-2048</strong></a> using today&#8217;s best methods. By comparison, a quantum computer running <strong>Grover&#8217;s algorithm</strong> could break AES-128 in <strong>600 years</strong>, while <strong>Shor&#8217;s algorithm</strong> would overcome RSA-2048 in just <strong>8 hours</strong> with a machine of 20 million qubits.</p>
<p style="text-align: justify;">Faced with this threat, <strong>AES</strong> and <strong>symmetric cryptography</strong>, as well as <a href="https://learning.quantum.ibm.com/course/practical-introduction-to-quantum-safe-cryptography/cryptographic-hash-functions"><strong>SHA-256</strong> and <strong>hash</strong> <strong>functions</strong></a>, remain viable by <strong>doubling</strong> the size of the keys used, but asymmetric cryptography needs to be rethought. With this in mind, <strong>post-quantum cryptography is emerging as the most promising solution.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What is post-quantum cryptography?</h2>
<p> </p>
<p style="text-align: justify;">According to the ANSSI, ‘post-quantum cryptography (PQC) is a set of classical cryptographic algorithms including <strong>key establishment</strong> and digital signatures, which provide conjectured security against the <strong>quantum</strong> threat in addition to their <strong>classical</strong> security’.</p>
<p style="text-align: justify;">This therefore refers to all the new <strong>asymmetric</strong> encryption algorithms capable of guaranteeing security against both <strong>traditional attacks</strong> and the new <strong>quantum</strong> attacks. The difference with those we use today lies essentially in the <strong>mathematical problems</strong> underlying the algorithms, chosen to remain complex to solve, even for a quantum computer.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Why is this solution considered the most promising?</h3>
<p style="text-align: justify;">PQC is not the only response being considered to the quantum threat, but it is widely regarded as the most viable solution by the international community. Several factors explain this interest, including</p>
<p style="text-align: justify;">&#8211; <strong>Continuity with current systems</strong>, facilitating its adoption and gradual integration into conventional infrastructures.</p>
<p style="text-align: justify;">&#8211; <strong>Advanced maturity</strong>, with standards already established and supported by the main cybersecurity authorities.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Continuity with current systems</h3>
<p style="text-align: justify;">How does this <em>classical</em> type of cryptography protect encrypted data against quantum attacks?</p>
<p style="text-align: justify;">PQC does not imply a paradigm shift in our approach to securing infrastructures. As mentioned earlier, PQC is part of the <em>family</em> of asymmetric cryptography and therefore retains the same operation and objective as current public key algorithms. Its resistance to quantum attacks is ensured by the <strong>nature</strong> of the underlying mathematical problems, which are different from those used in conventional asymmetric cryptography. This structural difference also means that cryptography can be integrated more seamlessly into today&#8217;s digital infrastructures, ensuring a gradual transition to a future in which PQC completely and effectively supplants modern encryption standards.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Advanced maturity</h3>
<p style="text-align: justify;">The second major advantage of the PQC is its maturity compared with the other options considered. This year saw the <a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">publication of PQC standards by the<em> US National Institute of Standards and Technology</em></a> (NIST) in August 2024.</p>
<p style="text-align: justify;">This process began in 2017 with 69 initial candidates, 4 of whom were selected to become the new PQC standards. None of the other solutions put forward to counter the coming threat, including quantum cryptography (based on the use of quantum properties as opposed to PQC, which can be implemented on conventional computers), have been the subject of a standardisation process.</p>
<p style="text-align: justify;">Furthermore, national cybersecurity bodies such as <a href="https://cyber.gouv.fr/publications/avis-de-lanssi-sur-la-migration-vers-la-cryptographie-post-quantique-0">ANSSI</a> (France), <a href="https://cyber.gouv.fr/sites/default/files/document/Quantum_Key_Distribution_Position_Paper.pdf">BSI (Germany), NLNCSA (Netherlands), SFA (Sweden),</a> <a href="https://www.ncsc.gov.uk/whitepaper/preparing-for-quantum-safe-cryptography">NCSC (UK),</a> <a href="https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/">NSA (USA)</a>, etc. all agree that CQP is the best way to protect against the quantum threat, and that the priority for businesses should be to migrate to CQP systems.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;">When and how can this technology be implemented?</h2>
<p> </p>
<p style="text-align: justify;">The predictions of research bodies on the advent of the quantum threat are still fairly disparate, but all agree that quantum computers capable of executing the algorithms responsible for the future obsolescence of current cryptographic standards, known as <strong>Cryptographically Relevant Quantum Computer</strong> (CRQC), will render RSA-2048 obsolete, in particular, within the <a href="https://www.splunk.com/en_us/blog/learn/crqcs-cryptographically-relevant-quantum-computers.html">next 15 years</a>. It is difficult to predict exactly when the quantum computer will be ready and will achieve <strong>sufficient performance</strong> for <strong>concrete</strong> use cases but cross-referencing the recommendations of organisations such as the <a href="https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/1/CSI_CNSA_2.0_FAQ_.PDF">NSA</a> with the predictions of <a href="https://globalriskinstitute.org/publication/2023-quantum-threat-timeline-report/">experts</a> on the subject means that we can estimate the emergence of the first <strong>CRQCs</strong> between <strong>2033</strong> and <strong>2037</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Harvest now, decrypt later</h3>
<p style="text-align: justify;">However, we do not have 10 years to arm ourselves against this threat. Data in transit today remains <strong>exposed</strong> to ‘harvest now, decrypt later’ attacks. These are attacks based on the <strong>interception</strong> and long-term<strong> storage</strong> of <strong>encrypted data</strong>, pending technological breakthroughs in decryption that will make it <strong>readable</strong> in the future.</p>
<p style="text-align: justify;">The data targeted by this type of attack is mainly data in <strong>transit</strong>, as it is during <strong>transport</strong> that protocols such as <strong>TLS</strong> use <strong>asymmetric</strong> key pairs. It is at this point that the data is ‘<strong>quantum vulnerable</strong>’ and therefore interesting to intercept and store to decrypt it later. Data <strong>at rest</strong>, on the other hand, is generally encrypted using <strong>symmetrical</strong> algorithms, and requires to be exfiltrated to be captured, so it is not the target of these attacks.</p>
<p style="text-align: justify;">The main risk of these attacks remains the violation of long-term data <strong>confidentiality</strong>. Depending on the sector, particularly <strong>financial</strong> or <strong>industrial</strong>, data can remain sensitive for <strong>long periods</strong>, so access to this information can have multiple serious consequences. It is reasonable to assume that attackers could <strong>currently</strong> recover a considerable quantity of encrypted data to decrypt it later. It is therefore imperative to start migrating to cryptographic systems that are resistant to quantum algorithms <strong>today</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Recommendations from organisations on preparation</h3>
<p style="text-align: justify;"><a href="https://media.defense.gov/2023/Aug/21/2003284212/-1/-1/0/CSI-QUANTUM-READINESS.PDF"><strong>CISA</strong>, the <strong>NSA</strong> and the American <strong>NIST</strong></a>, to name but a few, are urging companies to get ready now by drawing up a <strong>quantum roadmap</strong>, led by a <strong>dedicated project team</strong>, whose aim would be to <strong>plan</strong> and <strong>supervise</strong> the organisation&#8217;s <strong>migration</strong> to <strong>PQC</strong>.</p>
<p style="text-align: justify;">The project <strong>framework</strong> will need to focus on 3 main areas:</p>
<ol style="text-align: justify;">
<li><strong>Cryptographic inventory</strong>: the aim is to understand the organisation&#8217;s exposure to vulnerable cryptographic mechanisms. This involves identifying the technologies used in systems, network protocols, applications and programming libraries.</li>
<li><strong>Risk analysis</strong>: this aims to prioritise the assets and processes to be secured first. The aim is to assess the <strong>criticality</strong> of the data being protected, and also to <strong>anticipate the length of time it will need to be protected</strong>. This analysis is based on the cryptographic inventory carried out upstream and enables efforts to be targeted where the impact of a quantum attack would be most critical.</li>
<li><strong>Supplier responsibility:</strong> the transition to post-quantum cryptography also involves working closely with technology partners. Companies need to ensure that the solutions they use are crypto-agile: can current products be <strong>upgraded</strong> to systems that are resistant to the quantum threat, or will they need to be <strong>replaced</strong> to avoid obsolescence?</li>
</ol>
<p style="text-align: justify;">The <strong>migration strategy</strong> we recommend at <strong>Wavestone</strong> takes the main steps outlined by <strong>CISA</strong>, <strong>NSA</strong> and <strong>NIST</strong>, and adapts them to the operational realities of each company:</p>
<ol style="text-align: justify;">
<li><strong> Strategic phase:</strong>
<ul>
<li><strong>Understanding and raising awareness</strong>: Firstly, this involves training and informing all those involved (management, business teams, technical teams) about the impact of the quantum threat, the issues involved in post-quantum cryptography, and the main regulatory guidelines.</li>
<li><strong>Risk assessment and initial inventory</strong>: Mapping of cryptographic uses (protocols, libraries, applications, etc.) and identification of sensitive data that must remain confidential over a long period. It is also at this stage that the company&#8217;s maturity is assessed and the most critical projects prioritised.</li>
<li><strong>Framing the programme</strong>: On the basis of the risks identified, the overall roadmap (objectives, budget, organisation) is defined. A <strong>dedicated team</strong> &#8211; or ‘centre of excellence’ &#8211; is set up to steer the transition, coordinate the various projects and define the success indicators.</li>
</ul>
</li>
</ol>
<ol style="text-align: justify;" start="2">
<li><strong> Quick wins</strong>
<ul>
<li>Before embarking on a more extensive transformation phase, we recommend the <strong>rapid launch</strong> of low-investment <strong>initiatives</strong>, such as including <strong>post-quantum clauses in contracts</strong> (with suppliers and partners). The aim is to obtain tangible returns, raise stakeholder awareness and create a positive momentum around the project.</li>
</ul>
</li>
</ol>
<ol style="text-align: justify;" start="3">
<li><strong> Transition programme</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul style="text-align: justify;">
<li><strong>Test of an initial use case:</strong> Selection of a representative use case to deploy the first post-quantum cryptographic algorithms or mechanisms under real conditions.</li>
<li><strong>Detailed inventory (second iteration):</strong> We then need to refine the mapping of cryptographic components (PKI, key management, network protocols, encryption libraries, etc.) in order to plan the migration precisely.</li>
<li><strong>Modernising ‘digital trust’</strong>: This involves <strong>updating infrastructures</strong> (PKI, certificate management, key rotation policies, etc.) and implementing <strong>procedures</strong> to accommodate new algorithms.</li>
<li><strong>Migration and monitoring</strong>: Progressive deployment of post-quantum algorithms on critical systems, while maintaining service continuity. This phase is accompanied by controls, performance tests and security checks. Eventually, the entire IS is covered, guaranteeing continuity and regulatory compliance.</li>
</ul>
</li>
</ul>
<p style="text-align: justify;">This roadmap, which is both pragmatic and in line with the recommendations of the relevant bodies, <strong>guarantees</strong> a controlled transition to post-quantum cryptography.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h3 style="text-align: justify;">Hybridization mentioned in Europe as an important step in the transition</h3>
<p style="text-align: justify;">In a joint publication with its European counterparts <a href="https://cyber.gouv.fr/sites/default/files/document/Quantum_Key_Distribution_Position_Paper.pdf"><strong>BSI, NLNCSA, SNCS</strong>A and <strong>SFA</strong></a>, <a href="https://cyber.gouv.fr/sites/default/files/document/Quantum_Key_Distribution_Position_Paper.pdf"><strong>ANSSI</strong></a> also recommends that preparations for this transition should begin as soon as possible. Although the new PQC standards, including algorithms, implementation instructions and their use, were published by the NIST in August 2024, these bodies are not encouraging the <strong>immediate</strong> integration of these algorithms into companies&#8217; cryptographic systems. The ANSSI has even announced that it ‘<a href="https://cyber.gouv.fr/publications/avis-de-lanssi-sur-la-migration-vers-la-cryptographie-post-quantique-0">does not approve any direct replacement in the short or medium term’</a>. The reason for this is ‘a lack of cryptanalytical hindsight on several security aspects’; despite its completed standardisation process, PQC is not yet considered mature enough to guarantee security on its own:</p>
<p style="text-align: justify;">&#8211; Several algorithms that were finalists (and therefore considered promising) in the NIST standardisation process have been the subject of <strong>classic</strong> attacks that have been successful. The <strong>SIKE</strong> algorithm was defeated in 10 minutes, and <strong>Rainbow</strong> in a weekend.</p>
<p style="text-align: justify;">&#8211; Dimensioning, integration of algorithms into communication protocols and the design of secure implementations are other aspects on which progress needs to be made, according to the ANSSI.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Consequently, unlike <strong>NIST</strong>, <strong>ANSSI</strong> and <strong>BSI</strong>, among others, recommend that organisations adopt <strong>hybrid systems</strong>. This concept consists of ‘combining <strong>post-quantum asymmetric</strong> algorithms with well-known and well-studied <strong>pre-quantum asymmetric</strong> cryptography’ (ANSSI). In this way, we can benefit from the effectiveness of current standards against <strong>classical</strong> attacks, and from the predicted resistance of PQC against <strong>quantum</strong> attacks.</p>
<p style="text-align: justify;">Hybridization is possible for <strong>key encapsulation</strong> mechanisms and <strong>digital signatures</strong>. Each classical operation is replaced either by:</p>
<p style="text-align: justify;">&#8211; <strong>successive</strong> execution</p>
<p style="text-align: justify;">&#8211; <strong>parallel</strong> execution of the 2 algorithms, pre-quantum and quantum.</p>
<p style="text-align: justify;">The second option can be implemented to reduce the loss of system performance. These hybrid schemes also require the players involved to support both types of algorithms.</p>
<p style="text-align: justify;">This is a scheme where ‘the additional performance cost of a hybrid scheme remains <strong>low</strong> compared with the cost of the post-quantum scheme’. <strong>ANSSI</strong> believes that ‘this is a <strong>reasonable</strong> price to pay to guarantee pre-quantum security that is at least equivalent to that provided by current standardised pre-quantum algorithms’.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">On the other side of the Atlantic, we are much more nuanced than our European counterparts on this issue. Although the benefits of hybridisation are recognised by the UK and US cybersecurity authorities, the <a href="https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptography#section_5"><strong>NCSC</strong></a> and <a href="https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf"><strong>NIST</strong></a> insist on the <strong>temporary</strong> nature of this solution and do <strong>not impose</strong> hybridisation as a <strong>mandatory step</strong> before migrating completely to PQC. The <a href="https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/1/CSI_CNSA_2.0_FAQ_.PDF"><strong>NSA</strong></a> explicitly states that it has confidence in PQC standards and does <strong>not require</strong> the use of hybridisation models in national security systems. In summary, the decision to use these models must be taken taking into account:</p>
<p style="text-align: justify;">&#8211; technical implementation constraints</p>
<p style="text-align: justify;">&#8211; the increased complexity (two algorithms instead of one),</p>
<p style="text-align: justify;">&#8211; the additional cost,</p>
<p style="text-align: justify;">&#8211; the need to transition a <strong>second</strong> time in the future to a total PQC system, which can be a complex exercise in <strong>crypto-agility</strong> &#8211; i.e. the ability to modify one&#8217;s cryptographic infrastructure <strong>rapidly</strong> and without major upheaval in response to changing threats &#8211; for some companies.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Regulatory aspects</h2>
<p> </p>
<p style="text-align: justify;">There are currently no <strong>European</strong> regulations setting out explicit requirements for post-quantum cryptography. However, some of the various texts on data encryption (NIS2, DORA, HDS, etc.) explicitly require <strong>state-of-the-art</strong> encryption to be applied.  In particular, DORA requires the constant updating of the cryptographic means used in relation to developments in cryptanalysis techniques. It is therefore possible to consider this as a first step in guiding organisations towards the concept of <strong>crypto-agility</strong>.</p>
<p style="text-align: justify;">Despite the current lack of requirements, ANSSI is <a href="https://cyber.gouv.fr/publications/avis-de-lanssi-sur-la-migration-vers-la-cryptographie-post-quantique-0">planning a post-quantum transition plan in 3 phases</a>:</p>
<ol style="text-align: justify;">
<li><strong> Phase 1 (in progress)</strong></li>
</ol>
<p style="text-align: justify;">Effective post-quantum security through hybridisation remains optional and is considered by the agency to be defence in depth. The security approvals issued by ANSSI remain unchanged and only guarantee pre-quantum security.</p>
<ol style="text-align: justify;" start="2">
<li><strong> Phase 2 (after 2025)</strong></li>
</ol>
<p style="text-align: justify;">Quantum resistance becomes a security property. Post-quantum security criteria for PQC algorithms will have been defined by ANSSI and will be taken into account when issuing security visas.</p>
<ol style="text-align: justify;" start="3">
<li><strong> Phase 3 (after 2030)</strong></li>
</ol>
<p style="text-align: justify;">It is estimated that the post-quantum security assurance level will be equivalent to the current pre-quantum level. Hybridization will therefore become optional; security visas may be issued for companies using post-quantum schemes <strong>without hybridization</strong>.</p>
<p style="text-align: justify;">In addition, depending on the context, ANSSI may decide to grant security visas only for long-term <strong>post-quantum</strong> security.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25580" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-1.png" alt="" width="309" height="236" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-1.png 309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-1-250x191.png 250w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-1-51x39.png 51w" sizes="auto, (max-width: 309px) 100vw, 309px" /></p>
<p style="text-align: justify;">In the USA, <a href="https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf">NIST&#8217;s post-quantum transition plan</a> is not definitive, but the obsolescence of <strong>RSA</strong> and <strong>ECC</strong> is already projected for 2030, followed by a total implementation ban in 2035; hence the announced target &#8211; aligned with the <a href="https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/1/CSI_CNSA_2.0_FAQ_.PDF">NSA</a> &#8211; for completion of the migration to PQC in all federal systems in the same year. Depending on the requirements of different sectors, it may be necessary to make the transition more quickly, depending on the associated levels of risk.</p>
<p style="text-align: justify;">Although 2035 seems a long way off, the full migration to post-quantum cryptography is a <strong>long process</strong>, and the initial phases of <strong>cryptographic inventory</strong>, <strong>data classification</strong> and <strong>risk analysis</strong>, in particular, require considerable time. It is therefore essential to start today to plan for a successful transition.</p>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;">The advent of quantum computers is therefore no longer a distant hypothesis, but a certainty that will redefine the foundations of cybersecurity. While the precise timing (<strong>2033-2037</strong>) remains uncertain, the regulatory pressure from cybersecurity institutions is becoming <strong>clearer</strong>, and the impact on data confidentiality and integrity is <strong>unavoidable</strong>. Every day that goes by without adaptation increases the vulnerability of companies to future attacks.</p>
<p style="text-align: justify;">And yet, solutions already exist: <strong>post-quantum cryptography</strong>, although not yet fully mature &#8211; especially when it comes to implementation &#8211; offers a promising response to this threat. Standardised and supported by the major international bodies, it represents the first step towards sustainable security in the quantum era.</p>
<p style="text-align: justify;">However, adopting this technology is not simply a matter of technical deployment. It is a strategic transition, an exercise in crypto-agility, and an opportunity for businesses to assert their resilience in the face of technological upheaval.</p>
<p style="text-align: justify;">The question is no longer whether your organisation will be ready when the first quantum computer capable of breaking RSA-2048 sees the light of day. The question is whether it will have anticipated this future, by arming itself now with the tools and plans needed to turn this constraint into a competitive advantage. The future of security starts today.</p>
<p> </p>
<p><a href="https://www.riskinsight-wavestone.com/en/contact-us/">Contact us</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/">Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Radar 2025 of Post Quantum Migration Solutions</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/01/2025-radar-of-post-quantum-safety-solutions/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/01/2025-radar-of-post-quantum-safety-solutions/#respond</comments>
		
		<dc:creator><![CDATA[Johann Plüss]]></dc:creator>
		<pubDate>Tue, 21 Jan 2025 08:32:04 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25176</guid>

					<description><![CDATA[<p>Quantum computing threatens today’s asymmetric cryptography and would render current algorithms obsolete, both RSA and ECC. As for symmetric cryptography, (AES, hash functions) doubling the key size ensures maintained security guarantees. To address the threat, the NIST has standardized three...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/2025-radar-of-post-quantum-safety-solutions/">Radar 2025 of Post Quantum Migration Solutions</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Quantum computing threatens today’s asymmetric cryptography and would render current algorithms obsolete, both RSA and ECC. As for symmetric cryptography, (AES, hash functions) doubling the key size ensures maintained security guarantees. To address the threat, the NIST has standardized three post-quantum (resistant to quantum computers) asymmetric algorithms in August 2024.</p>
<p style="text-align: justify;">Fortunately, quantum computers are not performant enough yet to conduct such attacks. Estimates vary as to when this will be a reality, though most expect it between <a href="https://blog.cloudflare.com/pq-2024/">2033 and 2037</a>. Furthermore, regulators have begun outlining end-of-life timelines for existing algorithms, with Australia’s ASD <a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-cryptography">planning</a> to designate them as obsolete by 2030 and the NIST <a href="https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf">drafting</a> its own retirement schedule for 2035. We expect such announcements to pick up during the coming months from other nations.</p>
<p style="text-align: justify;">As such, regardless of the exact date of emergence of quantum computers capable of breaking current cryptographic algorithms, a transition will be obligatory from a regulation standpoint.</p>
<p style="text-align: justify;">Migrating a complicated IT infrastructure is no trivial feat: in a 2022 <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/05/04/national-security-memorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-to-vulnerable-cryptographic-systems/">memorandum</a>, the Biden administration expected the migration of all U.S. Federal Agencies to cost more than $7 billion. Such a complex endeavor entails a plethora of aspects from assessing risks, to executing the technical migration, with many intermediary steps. Solutions exist to accompany or accelerate those stages.</p>
<p style="text-align: justify;">Wavestone’s 2025 Post-Quantum Migration Migrations radar offers a first visual panorama of market leading cybersecurity solutions for this migration. This radar has been and will continue to be updated in the coming months. Any company that feels it should be part of the radar is encouraged to reach out.</p>
<p style="text-align: justify;">The goal of the radar is not to inventory solutions that completed their PQC migration, but rather solutions that help and accelerate the PQC migration.</p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25862" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/radar.png" alt="Radar 2025 Post Quantum Migration Solutions" width="1295" height="785" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/radar.png 1295w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/radar-315x191.png 315w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/radar-64x39.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/radar-768x466.png 768w" sizes="auto, (max-width: 1295px) 100vw, 1295px" /></p>
<h2 style="text-align: justify;">Categories </h2>
<ul style="text-align: justify;">
<li><b><span data-contrast="auto">Inventory</span></b><span data-contrast="auto">:</span> <span data-contrast="auto">Automatically inventory the type and locations of all cryptography in use</span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Migration Management</span></b><span data-contrast="auto">:</span> <span data-contrast="auto">Provide the big picture view of the post quantum transition, often based on inventory outputs</span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">PQC Compliant HSM / PKI /CLM</span></b><span data-contrast="auto">:</span> <span data-contrast="auto">Provide quantum resistant core trust components necessary for most company services</span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Libraries / Embedded Services</span></b><span data-contrast="auto">:</span> <span data-contrast="auto">Encrypt and sign data with polyvalent libraries or directly integrated cloud solutions</span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Edge Protection</span></b><span data-contrast="auto">:</span> <span data-contrast="auto">Protect against quantum computing attack by providing an extra layer of security, be it at network or application level</span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Network Analysis:</span></b> <span data-contrast="auto">Detect network flows which use obsolete cryptography with probes</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Key Market Trends </h2>
<h3 style="text-align: justify;"> </h3>
<h3 style="text-align: justify;">Size disparities</h3>
<p style="text-align: justify;">The market landscape for post-quantum security solutions exhibits significant disparities in the size and maturity of players. On one end of the spectrum, tech giants and established cybersecurity firms leverage extensive resources to develop and promote robust solutions. On the other end, niche start-ups and pure players are driving rapid advancements in specialized areas. We expect this diversity to foster:</p>
<ol style="text-align: justify;">
<li><strong>Innovation</strong>: Diversity in the market landscape, with contributions from both tech giants and pure players which enhances the pace and quality of innovation.</li>
<li><strong>Fragmentation</strong>: smaller players may struggle to achieve the scale required to implement their solutions broadly</li>
<li><strong>Partnerships</strong>: we are already witnessing how Thales and IBM are leveraging innovation in specific areas of pure players with their own resources and expertise.</li>
</ol>
<p style="text-align: justify;">As the market matures, it will be exciting to follow how its landscape evolves.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Several open-source libraries… with Big Tech support</h3>
<p style="text-align: justify;">Already, several open-source libraries propose post-quantum cryptograph. The most high-profile libraries, such as OpenSSL, are not the most advanced on this, with their own implementations currently ongoing, while Open Quantum Safe’s liboq is already ready. Nevertheless, it is a promising sight for the cybersecurity ecosystem that a topic as crucial as post-quantum security has solutions deeply rooted in open-source principles.</p>
<p style="text-align: justify;">Yet, Big Tech companies play a pivotal role in supporting open-source libraries for post-quantum cryptography, recognizing their potential to accelerate adoption and innovation. Initiatives like Open Quantum Safe’s liboq has supporters that include Microsoft, Amazon and IBM; Bouncy Castle’s PQC was developed with Keyfactor’s sizeable participation, and Tink, Google’s open-source library offer PQC as well. However, most of the implementation has not been fully formally verified, though the process is underway.</p>
<p style="text-align: justify;"><span style="font-size: revert; color: initial;"> </span></p>
<h3 style="text-align: justify;">A lack of certification for HSMs…</h3>
<p style="text-align: justify;">Hardware Security Modules (HSMs) play a crucial role in the digital trust chain, but the market for these hardware solutions is not yet ready. Initially, providers resorted to software implementations for experimental purposes while waiting for the new standard to be published by NIST. However, hardware implementations have advanced since then, even though their certification is not expected until Q3 or Q4 2025.</p>
<p style="text-align: justify;">Furthermore, although HSMs are designed to resist tampering and reduce the risks of key exposure, they will have to face challenges related to side-channel attacks due to the still limited maturity of current implementations of these new algorithms.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">And a lack of hardware for IoT, embedded devices, and smart cards</h3>
<p style="text-align: justify;">The lack of hardware is particularly problematic for connected objects (IoT), embedded devices, and smart cards, which operate under severe constraints – limited power, reduced computing capacity, and restricted storage space – thus requiring efficient algorithms and specialized dedicated hardware for cryptographic operations. Unfortunately, the current absence of dedicated processors remains a major obstacle.</p>
<p style="text-align: justify;">Moreover, the decentralized nature of embedded devices will represent a considerable challenge to overcome, as upgrading legacy equipment will be complex and costly.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">A strong market dynamism</h3>
<p style="text-align: justify;"><span style="font-size: revert; color: initial;">Post-quantum security is very much an emerging topic. Yet, today’s market for solutions is extremely dynamic, Companies, governments, and institutions are mobilizing to address emerging risks, fueling a surge in innovative and specialized technological offerings. This momentum will be further accelerated by expected regulatory pressures, such as those from NIST, ASD, and ENISA, compelling organizations to adopt robust and compliant solutions.</span></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">An international and sovereign Market: digital sovereignty at stake</h3>
<p style="text-align: justify;">The quantum computing market is both global and deeply intertwined with questions of national sovereignty. Quantum computers are considered a strategic issue by the world’s leading nations, which invest hundreds of billions to ensure their sovereignty in that emergent field.</p>
<p style="text-align: justify;">On the other hand, the market for post-quantum security is framed in a much more international prism. Companies in our radar span many nations, with the U.S. being nevertheless the uncontested leader. Moreover, international partnerships have also taken place such as Thales, which partners with IBM, CryptoNext and many more to combine their respective expertise and provide clients with advanced solutions.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">A promising but incomplete market coverage</h2>
<p style="text-align: justify;">As we have covered, the market is extremely dynamic. The question remains whether the ecosystem’s needs for a post quantum transition are currently met. Currently, there is a lack of true hardware post-quantum solutions, as most of what exists is only a post-quantum layer. Nevertheless, our understanding of the market is very much that it is under development and should be more and more available this year already. Based on how we advise clients in planning and implementing their migration, the market solutions address or will address shortly most of our client’s needs.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Our evolving radar constitutes the first edition in this field. In that sense, we strongly encourage any absent company to contact us to remedy the situation.<span data-ccp-props="{}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/2025-radar-of-post-quantum-safety-solutions/">Radar 2025 of Post Quantum Migration Solutions</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/01/2025-radar-of-post-quantum-safety-solutions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Post-quantum cryptography is here: what are the consequences and actions for large organisations? </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/09/post-quantum-cryptography-is-here-what-are-the-consequences-and-actions-for-large-organisations/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/09/post-quantum-cryptography-is-here-what-are-the-consequences-and-actions-for-large-organisations/#respond</comments>
		
		<dc:creator><![CDATA[Johann Plüss]]></dc:creator>
		<pubDate>Mon, 23 Sep 2024 06:52:19 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23956</guid>

					<description><![CDATA[<p>This summer&#8217;s post-quantum news: what you need to know  This summer marks a major breakthrough in cybersecurity with the publication of the NIST standards for post-quantum cryptography. This publication is the culmination of many years of work, the standardisation process...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/post-quantum-cryptography-is-here-what-are-the-consequences-and-actions-for-large-organisations/">Post-quantum cryptography is here: what are the consequences and actions for large organisations? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 aria-level="2">This summer&#8217;s post-quantum news: what you need to know </h1>
<p><span data-contrast="auto">This summer marks a major breakthrough in cybersecurity with the publication of the NIST standards for post-quantum cryptography. This publication is the culmination of many years of work, the standardisation process having begun in 2016, while the mathematical research has lasted decades.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">This news has been eagerly awaited by the cyber community, because the threat is so real: a sufficiently powerful quantum computer would render all current asymmetric cryptography obsolete. This would mean the impossibility of exchanging encryption keys, as well as the possibility of digitally signing documents. In short, it would mean the end of confidentiality and integrity guarantees for communications.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">It&#8217;s difficult to describe the extent of the consequences, with secure communications on the Internet becoming near enough impossible.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">To counter this, 3 new cryptographic standards have been identified:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li><span data-contrast="auto">ML-KEM (CRYSTALS-Kyber), the new main standard for encryption and therefore key exchange</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">ML-DSA (CRYSTALS-Dilithium), the new main standard for digital signatures</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></li>
<li><span data-contrast="auto">SLH-DSA (Sphincs+), the backup solution for backup signatures should ML-DSA prove vulnerable.</span></li>
</ul>
<p>Note that a “backup” solution for encryption, FN-DSA (FALCON), will be released in the near future.<span style="font-size: revert; color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">The standards are published, but the post-quantum efforts are not over &#8211; quite the contrary!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<h1 aria-level="2">Integrations begin: editors and developers in action </h1>
<p><span data-contrast="auto">Publication of the standards means that the next stage in the post-quantum security process can begin: integration of the algorithms by the major players and developers of technological solutions. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">This work has already begun, of course, and includes the integration of post-quantum algorithms into the development roadmap of Tink</span><span data-contrast="auto">1</span><span data-contrast="auto">, Google&#8217;s well-known cryptographic library. Also worthy of mention is the partnership between IBM and Thales</span><span data-contrast="auto">2</span><span data-contrast="auto"> for complete post-quantum security, from VPN to TLS to digital document signing. Finally, Microsoft</span><span data-contrast="auto">3</span><span data-contrast="auto"> has also indicated that efforts are now underway for a post-quantum transition of their services, from cloud to on-premise. Even Apple</span><span data-contrast="auto">4</span><span data-contrast="auto"> in the consumer sphere has launched the migration of iMessage to post-quantum algorithms.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">But beware, post-quantum security is not suddenly a reality. It is and will be a long process which relies, in particular, on the efforts of all IT service providers. It&#8217;s encouraging to see that market leaders are taking this subject seriously.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<h1><span data-contrast="none">It&#8217;s up to large organisations to act! </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:278}"> </span></h1>
<p><span data-contrast="auto">Post-quantum security doesn&#8217;t just concern GAFAM: all major organisations need to start transitioning to this new paradigm. We recommend that you start thinking about and adopting a post-quantum security strategy now, as US agencies are obliged to do so under the </span><i><span data-contrast="auto">Quantum Computing Cybersecurity Preparedness Act</span></i><span data-contrast="auto"> (2022). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">There are many major stages in this migration strategy, and it obviously has to cover conventional IT systems. But we mustn&#8217;t forget industrial systems and embedded systems (vehicles, trains, connected objects, remote systems, etc.). For each of these areas, the following elements need to be consolidated:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li><span data-contrast="auto">An inventory of data and its security shelf-life, particularly for long-lived data, in order to prioritise safeguards.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">An inventory of cryptographic solutions used in-house, to identify their origins and responsibilities (in-house, open-source, suppliers, etc.).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Each use of asymmetric cryptography must be the subject of a transition plan, including a POC. Note that symmetrical AES cryptography does not require any transition, with the exception of the move to AES256 for ultra-critical data (sensitive over several decades). For legacy systems, beyond the migration of encryption systems, it may be necessary to re-encrypt part of the stored data.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">The entire cryptographic chain will obviously have to evolve, from PKI to certificates, via the various encryption and signature systems. We&#8217;ll also need to pay close attention to performance issues, particularly in embedded environments. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">New projects must take post-quantum security into account right from the design stage:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span>
<ul>
<li><span data-contrast="auto">With the inclusion of post-quantum security criteria in the evaluation of service providers.</span></li>
<li data-leveltext="o" data-font="Courier New" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="2"><span data-contrast="auto">All in-house projects must include the use of post-quantum asymmetric cryptography, requirements equivalent to AES256 for symmetric cryptography, and guarantees equivalent to SHA512 for hashing.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ul>
</li>
</ul>
<p><span data-contrast="auto">Given the scale of the task, a complete ecosystem of suppliers is emerging to support inventorying, risk assessment (via library or source code scanning) and action plan follow-up. This is the case at Thales, IBM and Sandbox AQ. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">But beyond the tools, it will be necessary to embark on a real transformation programme, mobilising IT teams, the business lines concerned, and also purchasing if the supplier stakes are high. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">This migration is also an opportunity to think more deeply about the management of “crypto agility”, because let&#8217;s face it, these algorithms are fairly “new”, and it&#8217;s not impossible that flaws will be discovered that will require upgrades. The transformation programme should not lead to a “one-off” migration, but rather to the mastery of agile cryptography within the organisation. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">History shows that it takes 3 to 4 years to initiate and complete this type of migration. And it won&#8217;t be easy to make headway on this issue, so invisible is it to the business world. Let&#8217;s hope that regulations, particularly in Europe, will bring the subject into the spotlight!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<h1><span data-contrast="none">Risks and timelines: when to act? </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:278}"> </span></h1>
<p aria-level="2"><span data-contrast="auto">Estimates vary as to when a quantum computer will be able to “break” state-of-the-art RSA encryption. Most place it between 2030 and 2040, with a concentration of estimates around 2033-2035. The NSA requires exclusively post-quantum cryptography from its software, firmware and network equipment suppliers as early as 2030, from 2033 for certain others (e.g. O.S.) and 2035 for all its suppliers</span><span data-contrast="auto">. Post-quantum cryptography should be available as early as 2025 in certain cases.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">Even if nobody knows exactly when quantum computers will be sufficiently sophisticated, not being ready by 2033 means accepting risks that will have a serious impact on the most sensitive data.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">However, another threat exists today. We are all now exposed to the risk of “Harvest Now, Decrypt Later”, which consists in the large-scale storage of Internet communications for future decryption with a quantum computer (or when encryption keys are leaked). This risk obviously concerns entities with very specific capabilities, namely state agencies or groups of attackers backed by them. Only those organisations whose data is of strategic interest to these agencies are most at risk. It&#8217;s this particularity that has prompted migrations for some specific players. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">But for all of them, given the efforts required and the risk zone by 2030, it&#8217;s in the 2025 action plan that the first phases of assessment and construction of the project plan must be planned!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/post-quantum-cryptography-is-here-what-are-the-consequences-and-actions-for-large-organisations/">Post-quantum cryptography is here: what are the consequences and actions for large organisations? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/09/post-quantum-cryptography-is-here-what-are-the-consequences-and-actions-for-large-organisations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Startups Radar: 2024, year of AI Sec in Switzerland </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/07/cybersecurity-startups-radar-2024-year-of-ai-sec-in-switzerland/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/07/cybersecurity-startups-radar-2024-year-of-ai-sec-in-switzerland/#respond</comments>
		
		<dc:creator><![CDATA[Johann Plüss]]></dc:creator>
		<pubDate>Mon, 01 Jul 2024 13:00:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23461</guid>

					<description><![CDATA[<p>Swiss Cyber Startups Position Themselves for Trustworthy AI   Every year, since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. The year 2024 marks the takeoff of AI security – a critical year, characterized by the exponential progress...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/cybersecurity-startups-radar-2024-year-of-ai-sec-in-switzerland/">Cybersecurity Startups Radar: 2024, year of AI Sec in Switzerland </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1><b><span data-contrast="auto">Swiss Cyber Startups Position Themselves for Trustworthy AI</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></h1>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span><span data-contrast="auto">Every year, since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. The year 2024 marks the takeoff of AI security – a critical year, characterized by the exponential progress of AI – within the Swiss ecosystem. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">Not a day seems to go by without artificial intelligence making the headlines. While this raises fundamental societal questions, there is one issue on which all experts agree: this cutting-edge technology is associated with serious risks. Various types of attacks have already been identified, such as data poisoning where attackers manipulate data or models during training to alter the outcome of the AI; oracle attacks, which involve manipulating the tool to reveal information that compromises the models or training data ; and evasion attacks, where small input perturbations cause significant output errors.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">Switzerland, as a hub of innovation and technology, has a key role to play in securing these solutions and presents Swiss startups that aim to address these risks. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">Firstly, Calvin Risk offers a platform that allows risk management and AI compliance to be managed centrally, fulfilling the current regulations that are only set to increase, as the AI act has just been approved by the European Parliament.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-23438 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-07-01-093458.png" alt="" width="430" height="65" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-07-01-093458.png 1223w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-07-01-093458-437x66.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-07-01-093458-71x11.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-07-01-093458-768x116.png 768w" sizes="auto, (max-width: 430px) 100vw, 430px" /></p>
<p><span data-contrast="auto">As recently seen, Generative AI comes with a host of new attacks. This crucial problem is addressed by Lakera with its security solutions for Generative AI, notably against prompt injections and model extraction.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-24095 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-092459.png" alt="" width="447" height="58" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-092459.png 1433w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-092459-437x57.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-092459-71x9.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-092459-768x100.png 768w" sizes="auto, (max-width: 447px) 100vw, 447px" /></p>
<p><span data-contrast="auto">Finally, in contexts with strong sovereignty constraints, Clear Sky offers the deployment of an on-premises artificial assistant that guarantees that the most sensitive data – from both regulatory and strategic standpoints– do not leave the perimeter. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><img loading="lazy" decoding="async" class="wp-image-23450 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-07-01-112850.png" alt="" width="303" height="159" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-07-01-112850.png 575w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-07-01-112850-364x191.png 364w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-07-01-112850-71x37.png 71w" sizes="auto, (max-width: 303px) 100vw, 303px" /></p>
<p><span data-contrast="auto">Integrating new AI security technologies is crucial for a safer and more ethical future.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-24089 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-09-27-134522.png" alt="" width="1786" height="1002" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-09-27-134522.png 1786w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-09-27-134522-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-09-27-134522-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-09-27-134522-768x431.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-09-27-134522-1536x862.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-09-27-134522-800x450.png 800w" sizes="auto, (max-width: 1786px) 100vw, 1786px" /></p>
<h1><strong>Key figures</strong></h1>
<ul>
<li>16 employees on average</li>
<li>153M CHF in public funding</li>
<li>42 Swiss startups</li>
<li>2021 average year of creation</li>
</ul>
<h1><strong>Start-ups on the cyber radar in 2024</strong></h1>
<h1 style="text-align: left;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-24113" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-095415.png" alt="" width="1533" height="264" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-095415.png 1533w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-095415-437x75.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-095415-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-095415-768x132.png 768w" sizes="auto, (max-width: 1533px) 100vw, 1533px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-24111" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-095434.png" alt="" width="1534" height="334" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-095434.png 1534w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-095434-437x95.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-095434-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-095434-768x167.png 768w" sizes="auto, (max-width: 1534px) 100vw, 1534px" /> <img loading="lazy" decoding="async" class="alignnone size-full wp-image-24119" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-094716.png" alt="" width="1526" height="269" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-094716.png 1526w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-094716-437x77.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-094716-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-094716-768x135.png 768w" sizes="auto, (max-width: 1526px) 100vw, 1526px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-24117" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-094819.png" alt="" width="1520" height="332" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-094819.png 1520w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-094819-437x95.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-094819-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Capture-decran-2024-10-01-094819-768x168.png 768w" sizes="auto, (max-width: 1520px) 100vw, 1520px" /></h1>
<p> </p>
<h1 style="text-align: left;"><strong>Geographical focus: A start-up ecosystem concentrated in Lausanne and Zurich, but Geneva is emerging as a challenger</strong></h1>
<p><span data-contrast="none">Unsurprisingly, most startups are located around two main technological clusters: Zürich and Lausanne. This confirms an already existing trend since these two cities are hosting Swiss Federal institutes of technology (ETHZ in Zürich, EPFL in Lausanne).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="none">These universities are providing fertile ground for startups as they offer support in terms of infrastructure but also in terms of collaboration with students and labs. In return, intellectual property is shared between startups and universities. This model is a success for Switzerland</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="none"> as it allows to continuously improve the economy of these regions with a good balance between investment and research.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">Nevertheless, Geneva registers several new start-ups in this edition, allowing it to position itself as a challenger to the polytechnic hubs. Furthermore, this dynamism is expected to strengthen, as Geneva recently launched a new start-up incubator: the Trust Village Geneva.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<h1><b><span data-contrast="none">Methodology</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></h1>
<p><span data-contrast="none">Wavestone’s Swiss Cybersecurity Startups Radar identifies new players in the Swiss cyber innovation ecosystem. Its objective: to provide a global and critical view of an ever-renewing environment.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="none">Startups were selected according to our eligibility criteria:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Head office in Switzerland</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="none">Less than 50 employees</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="none">Less than 7 years of activity (established as of 2016)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">Business model around a specific product (software or hardware)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}"> </span></li>
</ul>
<p><span data-contrast="none">Startups were identified and evaluated according to the following procedure:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="none">Open Source Intelligence (OSINT) data consolidation</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="none">Evaluation in regard to above criteria</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"><span data-contrast="none">Qualitative interviews with the startups</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/cybersecurity-startups-radar-2024-year-of-ai-sec-in-switzerland/">Cybersecurity Startups Radar: 2024, year of AI Sec in Switzerland </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/07/cybersecurity-startups-radar-2024-year-of-ai-sec-in-switzerland/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
