Cavero Quantum announces Board Changes 

Cavero Quantum, creator of the world’s first Continuous Trust Verification Protocol, is pleased to announce the appointment of Jeremy Lewis as Chairman of the company, succeeding Andrew Wallace, who is stepping down from the role after three years.

Cavero Quantum becomes ETSI member 

We are hugely proud to be new members of ETSI, the European Telecommunications Standards Institute, doing our part to help develop the standards for post-quantum cryptography in Europe.

Quantum Security and Legislation: What You Need to Know

Quantum computing is expected to render many traditional methods of exchanging cryptographic keys obsolete. Encryption keys that have protected confidential information from even the most powerful computers for decades could be easily broken by a cryptographically relevant quantum computer (CRQC) – and so-called Q-Day, when that computer becomes available to criminals, could be as little as 3 years away.

Symmetrikey vs PQC

The rise of quantum computing is forcing organisations to rethink how they secure data. Traditional protocols for generating and exchanging cryptographic keys, such as RSA and ECDH, will soon be broken by quantum computers, leaving sensitive data vulnerable to interception.

How to secure agentic AI

Isn’t it great to be the bearer of good news sometimes? Most of our readers work in cybersecurity, so the chances are you’re familiar with being the voice of caution in any room or discussion. And with the discussions around AI that will no doubt have engulfed your world, that voice of caution will have been both very loud and, possibly, also struggling to be heard.

Authentikey vs OTP

Authenticating any identity – human or non-human – requires a layered approach of multiple technologies and protocols. Getting the layers right for your organisation requires a good understanding of how the different methods of authentication work and their comparative strengths. As the methods of authentication grow and evolve, however, keeping track of how they best work together can be challenging.

What is Authentikey?

Authenticating both human and device identities is arguably the greatest threat facing cybersecurity experts – and by extension, the organisations they work for – this decade. If an attacker is able to pose as a genuine user with access to your network and your data, the damage they can do to your organisation, and potentially to your clients and suppliers, is significant.

Symmetrikey vs QKD

As quantum security efforts and innovations accelerate, the variety of technologies, protocols, standards, and algorithms can feel overwhelming. Especially because, in these early days of Post-Quantum Cryptography, the conversation is mainly being led by academics and technologists who are happy to talk in very technical terms.

Three things we learned at Mobile Future Forward 2025 

Last week I had a very productive and interesting day in Seattle at Mobile Future Forward 2025. The theme this year was “quantumverse” – the convergence of a number of revolutionary technologies, including quantum computing, and its potential to transform humanity – so naturally I wanted to represent Cavero Quantum, and learn more about how people are grappling with the challenge of quantum security.