On 20 January 2026, the European Commission published COM(2026) 13 final - a proposed directive amending NIS2 as part of a broader cybersecurity simplification package tied to the upcoming Cybersec...
A team at the University of Science and Technology of China (USTC) published a paper in Science that quietly redrew the map of what device-independent quantum key distribution (DI-QKD) can do. Led ...
India’s Department of Science and Technology (DST) published the “Implementation of Quantum Safe Ecosystem in India – Report of the Task Force.” This report, produced by a national Task Force under...
Today, a sea change is underway. Quantum Open Architecture (QOA) is doing for quantum computing what the PC revolution did for classical computing - opening up the ecosystem. Just as the computing ...
The Cybersecurity and Infrastructure Security Agency (CISA) released a definitive advisory titled "Product Categories for Technologies Use Post-Quantum Cryptography Standards." This document, manda...
At its core, quantum sovereignty means having full control over the critical layers of quantum technology domestically - the ability to design, manufacture, and operate quantum systems without exte...
Dutch startup QuantWare has announced VIO-40K™, a new 3D packaging architecture designed to build superconducting quantum processors with up to 10,000 qubits on a single device. This represents rou...
If you are a CISO under NIS2 or DORA, you are already expected to run a risk-management system that tracks material, evolving threats - and to implement “state‑of‑the‑art” controls appropriate to t...
A new peer-reviewed study titled "Enterprise Migration to Post-Quantum Cryptography: Timeline Analysis and Strategic Frameworks" by independent researcher Robert Campbell has been published in the ...
