{"id":29391,"date":"2026-03-11T18:18:49","date_gmt":"2026-03-11T17:18:49","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=29391"},"modified":"2026-03-16T13:45:09","modified_gmt":"2026-03-16T12:45:09","slug":"radar-2026-of-post-quantum-migration-solutions","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/","title":{"rendered":"Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0"},"content":{"rendered":"\n<h1>The Quantum Threat Is Becoming Clearer\u00a0<\/h1>\n<p><span data-contrast=\"auto\">Quantum computing poses a serious threat to today\u2019s asymmetric cryptography and is expected to\u00a0render\u00a0widely used algorithms such as RSA and ECC obsolete. By contrast,\u00a0symmetric cryptography (such as AES)\u00a0and hash functions,\u00a0maintaining\u00a0an equivalent level of security can be achieved by increasing key sizes or security parameters.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In response to this emerging risk, the NIST standardized four\u00a0post-quantum\u00a0asymmetric algorithms in August 2024, specifically designed to withstand attacks from quantum computers.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">While quantum computers are not yet powerful enough to carry out such attacks, estimates vary as to when this capability will be reached, with many experts\u00a0anticipating\u00a0a\u00a0timeframe\u00a0between 2033 and 2037.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Nevertheless, the \u201cHarvest Now, Decrypt Later\u201d (HNDL) threat\u2014where attackers collect encrypted data today with the intent of decrypting it in the future using quantum computers\u2014makes it critical to protect sensitive,\u00a0long-lived\u00a0data well before such machines become operational.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>2025: Regulatory Acceleration\u00a0<\/h1>\n<p><span data-contrast=\"auto\">While 2024 marked the completion of technical standards with the publication of the NIST specifications, 2025 stands out for the acceleration of institutional and regulatory roadmaps. In recent months, several major stakeholders have released their recommendations:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">The\u00a0<\/span><a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/coordinated-implementation-roadmap-transition-post-quantum-cryptography\"><b><span data-contrast=\"none\">European Union<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0has defined a roadmap for Member States and entities subject to NIS 2<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><a href=\"https:\/\/www.gov.uk\/government\/publications\/advancing-a-coordinated-roadmap-for-the-transition-to-post-quantum-cryptography-in-the-financial-sector\/g7-cyber-expert-group-statement-on-advancing-a-coordinated-roadmap-for-the-transition-to-post-quantum-cryptography-in-the-financial-sector-january-20\"><b><span data-contrast=\"none\">G7 Finance<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0has formally integrated the\u00a0post-quantum\u00a0transition into its priorities<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">The\u00a0<\/span><a href=\"https:\/\/www.bis.org\/publ\/bppdf\/bispap158.htm\"><b><span data-contrast=\"none\">Bank for International Settlements (BIS)<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0has raised awareness within the banking sector<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">The\u00a0<\/span><a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/pqc-migration-timelines\"><b><span data-contrast=\"none\">UK government<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0has published its national\u00a0post-quantum\u00a0roadmap<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">These announcements build on previously communicated timelines: the NIST released a draft targeting 2035, while the Australian Signals Directorate (ASD) set a 2030 deadline. We expect\u00a0additional\u00a0countries to issue similar announcements in the coming months.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As a result, the\u00a0post-quantum\u00a0transition is no longer solely a technological challenge. It is becoming a regulatory and institutional imperative, comparable to past largescale digital transformations. Regardless of the exact timeline for the emergence of quantum computers capable of breaking current cryptographic algorithms, a transition is unavoidable.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Migrating a complex IT infrastructure is far from trivial. According to a 2022 memorandum, the Biden administration estimated the cost of migrating all U.S. federal agencies at over $7 billion. Such a program spans multiple dimensions\u2014from risk assessment to technical execution\u2014and involves\u00a0numerous\u00a0intermediate steps. Dedicated solutions already exist to support and accelerate each phase of this transition.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>The\u00a0Wavestone\u00a0Radar: A Market Overview of Solutions\u00a0<\/h1>\n<p><span data-contrast=\"auto\">The 2026\u00a0Wavestone\u00a0Radar of\u00a0post-quantum\u00a0migration solutions provides a visual overview of the leading solutions available on the market to support this transition. It has been\u2014and will continue\u00a0to be\u2014regularly updated and enriched over the coming months.\u00a0Any company that believes it should be featured is encouraged to contact us.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The\u00a0objective\u00a0of this radar is not to list solutions that have already completed their\u00a0post-quantum\u00a0transition, but rather to highlight those that actively support and accelerate the migration process.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29398 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/radar_1-1.png\" alt=\"\" width=\"1828\" height=\"1032\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/radar_1-1.png 1828w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/radar_1-1-338x191.png 338w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/radar_1-1-69x39.png 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/radar_1-1-768x434.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/radar_1-1-1536x867.png 1536w\" sizes=\"auto, (max-width: 1828px) 100vw, 1828px\" \/><\/p>\n<h1>Radar Categories\u00a0<\/h1>\n<p><span data-contrast=\"auto\">Quantum Key Distribution (QKD) was considered but\u00a0ultimately excluded\u00a0as a category. While QKD is resistant to quantum computers, it is not technically a\u00a0post-quantum\u00a0cryptography technology and is not recommended by regulatory bodies.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Inventory<\/span><\/b><span data-contrast=\"auto\">: Automating the identification of all cryptographic assets, including the types of cryptography used and their locations<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Network Analysis<\/span><\/b><span data-contrast=\"auto\">: Detecting network traffic that relies on obsolete cryptography\u00a0using\u00a0network probes<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Migration Management<\/span><\/b><span data-contrast=\"auto\">:\u00a0Providing\u00a0an\u00a0end-to-end\u00a0view of the\u00a0post-quantum\u00a0transition, often based on inventory or network analysis results<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">PQC\u00a0compliant\u00a0HSM \/ PKI \/ CLM<\/span><\/b><span data-contrast=\"auto\">: Delivering essential digital trust components for most services that are resistant to quantum attacks<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Libraries \/ Embedded Services<\/span><\/b><span data-contrast=\"auto\">: Encrypting and signing data using versatile cryptographic libraries or\u00a0cloud\u00a0integrated\u00a0solutions<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Perimeter Protection<\/span><\/b><span data-contrast=\"auto\">: Adding an\u00a0additional\u00a0layer of security against quantum threats, notably through traffic encapsulation and application wrappers for critical systems<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<\/ul>\n<h1>Inventory: The Cornerstone of Any Migration\u00a0<\/h1>\n<p><span data-contrast=\"auto\">Our\u00a0initial\u00a0feedback from supporting\u00a0post-quantum\u00a0migration programs highlights a clear reality: it is impossible to plan and budget a migration without visibility into the existing environment.\u00a0<\/span><span data-contrast=\"auto\">Concretely,\u00a0organizations\u00a0need\u00a0to\u00a0understand\u00a0:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Which\u00a0use\u00a0cases\u00a0and data are\u00a0involved?<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Where\u00a0is cryptography used\u00a0across the information\u00a0system?<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Which algorithms are currently\u00a0deployed?<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Conducting an exhaustive inventory of a complex IT infrastructure\u00a0represents\u00a0a significant investment. It is therefore critical to prioritize the areas where inventory tools should be deployed first, based on three key criteria: data exposure (data accessible via the internet, exchanged with partners, etc.),\u00a0long-term\u00a0data sensitivity and vulnerability to HNDL attacks, and the technical components used to secure this data. Without this upfront\u00a0visibility\u2014understanding which algorithms are used, for which purposes, and to protect which data-effective migration planning becomes impossible.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, cryptographic inventory cannot rely on\u00a0a single source. Organizations must combine multiple complementary approaches: network probes enable\u00a0real-time\u00a0observation of traffic, code\u00a0analysis\u00a0identifies\u00a0cryptographic usage within applications and internal developments, SaaS\u00a0specific tools and interfaces with external providers reveal\u00a0third-party\u00a0dependencies, while existing CMDBs and reference repositories map the overall infrastructure. This multiplicity of sources creates a new strategic need for tools capable of centralizing heterogeneous information and providing a\u00a0consolidated, actionable view to effectively\u00a0manage\u00a0migration. A trend is\u00a0emerging\u00a0around the CBOM (Cryptography Bill of Materials) format to standardize these inventories, although it is still too early to assess its actual adoption across the market.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Inventory thus becomes the foundation of\u00a0post-quantum\u00a0migration governance. Without it, organizations are effectively navigating\u00a0blind.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Since 2024, the market for digital asset inventory solutions has experienced\u00a0strong growth, driven by the emergence of highly specialized players focused exclusively on the detection, mapping, and management of IT assets (hardware, software, cryptographic certificates, etc.). These vendors stand out for their deep\u00a0expertise\u00a0and ability to address complex environments.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">At the same time,\u00a0established\u00a0players in the network and infrastructure space\u00a0\u2013\u00a0such\u00a0as IBM, Samsung, Cisco, and Microsoft\u00a0\u2013\u00a0are\u00a0leveraging\u00a0their\u00a0deep knowledge of IT environments to deliver robust solutions. These offerings increasingly integrate advanced network probes and cryptographic inventory capabilities, with growing attention paid to\u00a0post-quantum\u00a0cryptography challenges.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>CryptoAgility: A Long Term Objective of the Post-quantum Transition\u00a0<\/h1>\n<p><span data-contrast=\"auto\">Cryptoagility\u00a0is not merely a technical feature; it is a strategic capability that enables organizations to adapt to cryptographic evolutions without operational disruption. As\u00a0post-quantum\u00a0cryptographic (PQC) algorithms increasingly become a regulatory standard,\u00a0cryptoagility\u00a0allows business logic to be decoupled from the underlying cryptography, thereby\u00a0facilitating\u00a0updates without requiring a complete overhaul of existing infrastructures.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To adopt a\u00a0crypto agile\u00a0approach, organizations must embed flexible and scalable mechanisms from the design phase, capable of adapting to cryptographic advances\u2014whether driven by the quantum threat or by the rapid deprecation of algorithms.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">On the library side, solutions offering a modular approach are now widely available. Tools such as\u00a0<\/span><b><span data-contrast=\"auto\">Open Quantum Safe (OQS)<\/span><\/b><span data-contrast=\"auto\">, compatible with OpenSSL and\u00a0BoringSSL, or\u00a0<\/span><b><span data-contrast=\"auto\">liboqs<\/span><\/b><span data-contrast=\"auto\">\u00a0(Intel),\u00a0optimized\u00a0for x86 architectures, enable the integration of\u00a0NIST standardized\u00a0post-quantum\u00a0algorithms (Kyber,\u00a0Dilithium, SPHINCS+).\u00a0<\/span><b><span data-contrast=\"auto\">Bouncy Castle<\/span><\/b><span data-contrast=\"auto\">, for its part, provides a unified API for Java and C#, easing the transition between classical and\u00a0post-quantum\u00a0cryptography.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, the modular approach offered by these libraries must be integrated into a broader ecosystem of specialized tools. In this context, inventory solutions and cryptographic key and certificate lifecycle management tools play a critical role. They enable the establishment of an exhaustive mapping of the cryptographic environment, providing full visibility into all assets that need to be protected. This comprehensive view forms an essential foundation for ensuring data security and implementing truly effective risk management.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Ultimately,\u00a0crypto\u00a0agility\u00a0goes beyond the technical domain. It is a strategic capability that allows organizations to secure their data sustainably, reduce\u00a0quantum related\u00a0risks, and approach the future with greater confidence. The technological building blocks are already in place; what\u00a0remains\u00a0is to integrate them today into cybersecurity strategies.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>Perimeter Protection: A Rapid Mitigation Strategy\u00a0<\/h1>\n<p><span data-contrast=\"auto\">Given the scale and complexity of\u00a0post-quantum\u00a0migration programs, perimeter protection (edge protection) solutions provide a pragmatic and\u00a0fast acting\u00a0approach to reducing exposure across critical data flows.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These solutions enable the rapid securing of sensitive communication channels\u2014such as VPNs, email, and file transfers\u00a0\u2013\u00a0by\u00a0encapsulating traffic within a\u00a0post-quantum\u00a0cryptographic layer, without requiring changes to the underlying applications. This makes it possible to deploy wrappers around critical applications without waiting for their full redesign or migration.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The primary advantage of this approach lies in the significant time savings it delivers. While a comprehensive application-level migration remains necessary in the medium term and may span several years, perimeter protection offers immediate security for the most exposed assets. This strategy allows organizations to intelligently prioritize the protection of their most sensitive data, while methodically preparing for the broader, long-term migration of their IT infrastructure.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>HSMs and Certifications: A Turning Point in 2025\u00a0<\/h1>\n<p><span data-contrast=\"auto\">In the first version of our radar, we highlighted the lack of certifications for\u00a0post-quantum\u00a0Hardware Security Modules (HSMs), which\u00a0represented\u00a0a major barrier to their deployment in production environments.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This situation has since evolved positively. Both the\u00a0<\/span><a href=\"https:\/\/cyber.gouv.fr\/actualites\/pour-lanssi-la-cryptographie-post-quantique-post-quantum-cryptography-ou-pqc-repr%C3%A9sente-la-voie-la-plus-prometteuse-pour-se-pr%C3%A9munir-contre-la-menace-quantique-la-transition-post-quantique-repose-notamment-sur-la-mise-%C3%A0-disposition-pour-les-uti\/\"><b><span data-contrast=\"none\">ANSSI<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0and the\u00a0<\/span><a href=\"https:\/\/www.infineon.com\/press-release\/2025\/infcss202501-043\"><b><span data-contrast=\"none\">BSI<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0have now issued three Common Criteria certifications for PQC\u00a0compatible HSMs (from\u00a0<\/span><b><span data-contrast=\"auto\">Samsung<\/span><\/b><span data-contrast=\"auto\">,\u00a0<\/span><b><span data-contrast=\"auto\">Thales<\/span><\/b><span data-contrast=\"auto\">, and\u00a0<\/span><b><span data-contrast=\"auto\">Infineon<\/span><\/b><span data-contrast=\"auto\">). These certifications mark a significant turning point and pave the way for\u00a0real-world\u00a0deployments under operational conditions.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">HSMs play a critical role in the digital trust chain, particularly for:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">The secure generation and storage of PQC keys, which are significantly larger than their classical counterparts<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Signature operations within Public Key Infrastructures (PKIs)<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">End-to-end\u00a0key lifecycle management (rotation, revocation, archiving), ensuring integrity and traceability to\u00a0maintain\u00a0the chain of trust<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">However, even when certified, these HSMs must still address challenges related to\u00a0side channel\u00a0attacks, given the relative immaturity of current implementations of these new algorithms. The scientific community continues to actively assess and analyze these risks.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>IoT and Embedded Systems: The Weak Link\u00a0<\/h1>\n<p><span data-contrast=\"auto\">While the market for PQC solutions is progressing rapidly for traditional IT environments, a worrying gap is\u00a0emerging\u00a0for IoT and embedded systems. These devices\u00a0operate\u00a0under severe constraints\u00a0\u2013\u00a0limited power, reduced processing capabilities, and restricted storage\u00a0\u2013\u00a0which directly conflict with the requirements of\u00a0post-quantum\u00a0algorithms, inherently more\u00a0resource intensive\u00a0than their classical counterparts.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Deploying PQC on such systems often requires dedicated processors with optimized instruction sets. However, the current hardware ecosystem\u00a0remains\u00a0insufficient: few dedicated PQC hardware accelerators are available on the market, and hardware development cycles typically span several\u00a0years. This technical complexity is compounded by the challenge of upgrading a highly decentralized and heterogeneous device landscape, including widely deployed and\u00a0hard\u00a0to\u00a0access\u00a0connected objects,\u00a0mission critical\u00a0industrial systems where downtime is costly, smart cards with long renewal cycles, and legacy equipment with limited or no update capabilities.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The risk is clear: a lasting gap could\u00a0emerge\u00a0between traditional IT environments, which will progressively migrate to PQC, and embedded IoT systems, which may remain vulnerable for a much longer period. Organizations must\u00a0anticipate\u00a0this challenge now by embedding PQC compatibility requirements into their specifications for all new deployments of embedded and connected equipment.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>A Nuanced Market Outlook\u00a0<\/h1>\n<p><span data-contrast=\"auto\">The market has now clearly acknowledged that the\u00a0post-quantum\u00a0transition will necessarily begin with a systematic inventory phase and a comprehensive risk assessment, a realization that has reshaped the structure of the ecosystem. This growing awareness is reflected in several encouraging developments: the proliferation of specialized solutions for mapping cryptographic assets; the first official certifications for\u00a0PQC\u00a0compatible\u00a0security modules, confirming their readiness for operational deployment; and the maturity of opensource libraries, now widely supported by the industry. Migration support tools further complement this landscape. In parallel, perimeter security approaches already make it possible to protect sensitive data flows without waiting for a full system overhaul.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, this momentum continues to face persistent challenges. Delays in the development of suitable hardware\u00a0\u2013\u00a0particularly\u00a0for IoT and embedded systems\u00a0\u2013 remain a major obstacle, with a\u00a0still limited\u00a0availability of\u00a0low power, PQC\u00a0compatible processors. Certifications, while promising, remain limited in number and cover only part of the available technological spectrum. Finally, inventory tools, despite becoming increasingly sophisticated, have yet to fully\u00a0demonstrate\u00a0their ability to effectively address the complexity and heterogeneity of large enterprise IT environments.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As a result, while the market has clearly oriented its efforts toward inventory and risk analysis as essential prerequisites for migration, technological and industrial challenges continue to slow largescale adoption.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Quantum Threat Is Becoming Clearer\u00a0 Quantum computing poses a serious threat to today\u2019s asymmetric cryptography and is expected to\u00a0render\u00a0widely used algorithms such as RSA and ECC obsolete. By contrast,\u00a0symmetric cryptography (such as AES)\u00a0and hash functions,\u00a0maintaining\u00a0an equivalent level of security&#8230;<\/p>\n","protected":false},"author":81,"featured_media":29389,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3977],"tags":[],"coauthors":[3789,4477,4612],"class_list":["post-29391","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-focus"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0 - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"The Quantum Threat Is Becoming Clearer\u00a0 Quantum computing poses a serious threat to today\u2019s asymmetric cryptography and is expected to\u00a0render\u00a0widely used algorithms such as RSA and ECC obsolete. By contrast,\u00a0symmetric cryptography (such as AES)\u00a0and hash functions,\u00a0maintaining\u00a0an equivalent level of security...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-11T17:18:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-16T12:45:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/geralt-digital-9301910_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"827\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bertrand Carlier, Johann Pl\u00fcss, Ma\u00ebl LEPROUST\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bertrand Carlier, Johann Pl\u00fcss, Ma\u00ebl LEPROUST\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/\"},\"author\":{\"name\":\"Bertrand Carlier\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de\"},\"headline\":\"Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0\",\"datePublished\":\"2026-03-11T17:18:49+00:00\",\"dateModified\":\"2026-03-16T12:45:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/\"},\"wordCount\":2006,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/geralt-digital-9301910_1920.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/\",\"name\":\"Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/geralt-digital-9301910_1920.jpg\",\"datePublished\":\"2026-03-11T17:18:49+00:00\",\"dateModified\":\"2026-03-16T12:45:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/geralt-digital-9301910_1920.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/geralt-digital-9301910_1920.jpg\",\"width\":1920,\"height\":827},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de\",\"name\":\"Bertrand Carlier\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bertrand-carlier_\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0 - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0 - RiskInsight","og_description":"The Quantum Threat Is Becoming Clearer\u00a0 Quantum computing poses a serious threat to today\u2019s asymmetric cryptography and is expected to\u00a0render\u00a0widely used algorithms such as RSA and ECC obsolete. By contrast,\u00a0symmetric cryptography (such as AES)\u00a0and hash functions,\u00a0maintaining\u00a0an equivalent level of security...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/","og_site_name":"RiskInsight","article_published_time":"2026-03-11T17:18:49+00:00","article_modified_time":"2026-03-16T12:45:09+00:00","og_image":[{"width":1920,"height":827,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/geralt-digital-9301910_1920.jpg","type":"image\/jpeg"}],"author":"Bertrand Carlier, Johann Pl\u00fcss, Ma\u00ebl LEPROUST","twitter_misc":{"Written by":"Bertrand Carlier, Johann Pl\u00fcss, Ma\u00ebl LEPROUST","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/"},"author":{"name":"Bertrand Carlier","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de"},"headline":"Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0","datePublished":"2026-03-11T17:18:49+00:00","dateModified":"2026-03-16T12:45:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/"},"wordCount":2006,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/geralt-digital-9301910_1920.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/","name":"Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/geralt-digital-9301910_1920.jpg","datePublished":"2026-03-11T17:18:49+00:00","dateModified":"2026-03-16T12:45:09+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/geralt-digital-9301910_1920.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/geralt-digital-9301910_1920.jpg","width":1920,"height":827},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/radar-2026-of-post-quantum-migration-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Radar 2026 of\u00a0Post-quantum\u00a0Migration Solutions\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de","name":"Bertrand Carlier","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bertrand-carlier_\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=29391"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29391\/revisions"}],"predecessor-version":[{"id":29401,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29391\/revisions\/29401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/29389"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=29391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=29391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=29391"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=29391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}