Upcoming Events
OODAcon 2025: Accelerating Disruptive Technologies—an annual event that brings together top minds across government, defense, and industry to explore the technologies shaping the future of innovation, strategy, and ...
Archived Events
View Entrust's exclusive workshop, designed specifically for forward-thinking customers like you, eager to elevate your cryptographic infrastructure without disrupting your operations.
Our Entrust experts shared practical insights and proven ...
View Entrust's exclusive workshop, designed specifically for forward-thinking customers like you, eager to elevate your cryptographic infrastructure without disrupting your operations.
As quantum technologies redefine the landscape of national security and cybersecurity, Quantum Summit 2025, hosted by NextGov, Defense One, and Route Fifty powered by GovExec, brought together thought leaders to explore urgent challenges and emerging opportunities. The summit covered everything from post-quantum ...
QuSecure and Carahsoft hosted a high-level webinar overviewing how they are helping Federal government agencies prepare for the future of cybersecurity with quantum-resilient solutions.
Fill out the form to access the recording for Federal use cases and strategies ...
Federal agencies are racing to modernize cybersecurity infrastructure — not only to prepare for the quantum threat, but also to meet evolving Zero Trust mandates.
The quantum era is here. Quantum computing is advancing at an extraordinary pace—and with it comes significant risk: rendering today’s cryptographic systems obsolete. Shor's algorithm poses a direct threat to encryption standards like RSA, ECC and DSA. While large-scale quantum computers are not yet available, ...
Quantum technologies are rapidly moving from research labs into real-world applications. For government and public sector IT leaders, gaining a clear understanding of quantum computing, quantum networks, and post-quantum security is essential for making informed strategic decisions. These ...
How much is your legacy Hardware Security Module (HSM) infrastructure holding you back? Legacy HSMs were not designed for the evolving demands of today’s federal IT environments. Burdened by manual operations, limited scalability, and outdated architectures, these systems are costly to maintain, unable to meet the ...
Attendees joined us for an exclusive discussion featuring thought leaders from D-Wave and Quantinuum as they explored the evolving quantum computing landscape and its implications for the public sector.
This timely conversation, moderated by Harvey Morrison of Marion ...