How to secure agentic AI

Isn’t it great to be the bearer of good news sometimes? Most of our readers work in cybersecurity, so the chances are you’re familiar with being the voice of caution in any room or discussion. And with the discussions around AI that will no doubt have engulfed your world, that voice of caution will have been both very loud and, possibly, also struggling to be heard.

Authentikey vs OTP

Authenticating any identity – human or non-human – requires a layered approach of multiple technologies and protocols. Getting the layers right for your organisation requires a good understanding of how the different methods of authentication work and their comparative strengths. As the methods of authentication grow and evolve, however, keeping track of how they best work together can be challenging.

What is Authentikey?

Authenticating both human and device identities is arguably the greatest threat facing cybersecurity experts – and by extension, the organisations they work for – this decade. If an attacker is able to pose as a genuine user with access to your network and your data, the damage they can do to your organisation, and potentially to your clients and suppliers, is significant.

Symmetrikey vs QKD

As quantum security efforts and innovations accelerate, the variety of technologies, protocols, standards, and algorithms can feel overwhelming. Especially because, in these early days of Post-Quantum Cryptography, the conversation is mainly being led by academics and technologists who are happy to talk in very technical terms.

Three things we learned at Mobile Future Forward 2025 

Last week I had a very productive and interesting day in Seattle at Mobile Future Forward 2025. The theme this year was “quantumverse” – the convergence of a number of revolutionary technologies, including quantum computing, and its potential to transform humanity – so naturally I wanted to represent Cavero Quantum, and learn more about how people are grappling with the challenge of quantum security.

Do we really need quantum-resistant cryptography? 

Yes. We really do. 

Not just because quantum computers may one day be able to break today’s encryptions. The threat isn’t purely on the horizon. It’s here today – in intent, strategy, and preparation.

What is Symmetrikey?  

Symmetrikey uses Ring Learning With Errors and Correlation Filtering to ensure quantum-safe, scalable security. Learn how in this blog.

Jet Lag and Excitement: Our CEO at Quantum Korea

Our CEO, James Trenholme, is in Seoul, unveiling Cavero Key at Quantum Korea. With key meetings and a presentation at the British Embassy, we’re forging global partnerships in quantum innovation.