Home
Categories
EXPLORE
True Crime
Comedy
Sports
Society & Culture
Business
News
History
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/65/63/4e/65634e27-37f0-316c-af1f-615dcb404097/mza_7885740909229082121.jpg/600x600bb.jpg
Cisco DevNet
Devvie
2 episodes
5 days ago
Your source for cutting-edge tech insights. We cover AI developments, network automation strategies, quantum computing breakthroughs, and emerging technologies. Practical knowledge, expert perspectives, and the latest innovations delivered straight to developers and network professionals. Subscribe for episodes on automation tools, AI implementations, quantum advances, and the technologies driving the future of networking.
Show more...
Technology
RSS
All content for Cisco DevNet is the property of Devvie and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Your source for cutting-edge tech insights. We cover AI developments, network automation strategies, quantum computing breakthroughs, and emerging technologies. Practical knowledge, expert perspectives, and the latest innovations delivered straight to developers and network professionals. Subscribe for episodes on automation tools, AI implementations, quantum advances, and the technologies driving the future of networking.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/44576396/44576396-1760047291374-c0afefdcf1d05.jpg
Preparing Security Teams for the Cryptographic Transition | The Quantum Unboxing
Cisco DevNet
4 minutes 56 seconds
1 week ago
Preparing Security Teams for the Cryptographic Transition | The Quantum Unboxing

How Post-Quantum Cryptography Affects Security and Encryption Algorithms

Table of Contents:

00:00 - Post-quantum adoption roadmap

01:23 - RSA, Elliptic Curve Cryptography (ECC), and Diffie-Hellman key exchange are particularly vulnerable to quantum attacks

2:12 - TLS protocols and quantum-resistant alternatives like ML-KEM

2:44 - AES brute-force attacks

03:37 - Cisco Secure Key Integration Protocol (SKIP)

04:34 - Post-Quantum Cryptography Standards

Cisco DevNet
Your source for cutting-edge tech insights. We cover AI developments, network automation strategies, quantum computing breakthroughs, and emerging technologies. Practical knowledge, expert perspectives, and the latest innovations delivered straight to developers and network professionals. Subscribe for episodes on automation tools, AI implementations, quantum advances, and the technologies driving the future of networking.