Knowledge base and FAQs

Documents

Product documentation, presentations,
demos, datasheets and more

News

Company and industry news articles
and annoucements

Blog

Thought leadership, commentary,
and chatter

Frequently asked questions

There are numerous technologies and solutions advertised across the cybersecurity landscape.  Below are a selection of questions applicable to CyberHive products:

Post quantum cryptography

There has been a significant amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. When quantum computers are available, they will be able to break many of the public-key encryption standards in use today. 

The goal of post-quantum cryptography (also called quantum-safe cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks.

For more information see: https://csrc.nist.gov/projects/post-quantum-cryptography

Unlike the standards employed today such as AES and RSA, new techniques are required to develop cryptosystems that prove resistant to attack by quantum computers.

NIST initiated a project to solicit, evaluate, and standardise new algorithms in 2017 and a shortlist of suitable candidates has been developed after 3 rounds of peer review.

Draft standards have been updated to be ratified shortly to replace existing documents such as FIPS-140.

See: https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization

Whilst mainstream quantum computers are still a few years away, the availability to nation-states is advancing rapidly, and the time will come where the compute power will be available as a service hosted in the public cloud.

Quantum computers are an ideal tool for record-replay attacks.  A scenario where encrypted data is harvested now and stored until a time in the future where it can be decrypted by using quantum compute power.  Much of today's data will still be sensitive in 5-10 years or even longer so appropriate protection must be implemented now.

For systems that have an expected lifecycle in excess of 5-10 years, post-quantum cryptography should be considered today.  Critical public infrastructure for example, or high-capital cost machinery would need to be updated to retro-fit enhanced security in the future - why not adopt a security by design approach and future-proof these architectures now?

Network security

The ZTNA architecture is inherently much more secure than VPN architecture.  VPN provides access to a network, whereas the ZTNA provides access to an individual application or resource, allowing a granularity of access.

Unlike VPNs, which trust every user and device inside the network and provide full access to the LAN (local area network), a zero trust design works on the principle that no user, computer, or network, inside or outside the perimeter, can be trusted– by default.  This significantly reduces the risk of lateral movement that would otherwise be possible with VPNs.

Didn't find what
you were looking for?

Talk to our team for your questions.