{"id":3379,"date":"2026-03-05T15:22:00","date_gmt":"2026-03-05T15:22:00","guid":{"rendered":"http:\/\/infosec-daily.com\/?page_id=3379"},"modified":"2026-03-05T15:22:00","modified_gmt":"2026-03-05T15:22:00","slug":"preparing-for-the-quantum-era-post-quantum-cryptography-webinar-for-security-leaders","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=3379","title":{"rendered":"Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders"},"content":{"rendered":"<p>Most organizations assume encrypted data is safe.<br \/>\nBut many attackers are already preparing for a future where today\u2019s encryption can be broken. Instead of trying to decrypt information now, they are collecting encrypted data and storing it so it can be decrypted later using quantum computers.<br \/>\nThis tactic\u2014known as \u201charvest now, decrypt later\u201d\u2014means sensitive data transmitted today could become<\/p>","protected":false},"excerpt":{"rendered":"<p>Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where today\u2019s encryption can be broken. Instead of trying to decrypt information now, they&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3380,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-3379","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3379"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3379\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/3380"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}