BlackBerry - A Strategy For Post Quantum Secure Communications

BlackBerry - A Strategy For Post Quantum Secure Communications

How prepared are organizations for a world where today's encrypted communications could be quietly stored and cracked years from now?
In this episode of Tech Talks Daily, I sat down with Nate Jenniges, Senior Vice President and General Manager at BlackBerry, to talk about why the conversation around quantum computing is moving from academic curiosity to operational reality.

For many leaders, quantum threats still feel distant, something for researchers and cryptographers to worry about. But as Nate explained, governments and adversaries are already capturing encrypted data today with the expectation that it can be decrypted later when quantum capabilities mature.

This idea of "harvest now, decrypt later" attacks completely changes the timeline for security planning. If sensitive information needs to remain confidential for five, ten, or even twenty years, the exposure may already have started. That means the challenge is no longer theoretical. It is becoming a strategic issue that boards, CISOs, and government leaders must begin addressing right now.

One of the most interesting parts of our conversation focused on something many people rarely think about. Metadata. While encryption protects the content of a message or phone call, the surrounding patterns often reveal just as much. Who spoke to whom, how often, from where, and at what time can tell a surprisingly detailed story. With modern analytics and AI tools, these patterns can expose command structures, business relationships, or crisis response activity even if the message itself remains encrypted.

Nate explained why this is becoming a frontline issue in the emerging post-quantum era. As organizations integrate AI into communication platforms, new forms of metadata are emerging from model interactions, system queries, and inference activities. That means protecting communications requires a broader view than simply upgrading encryption algorithms.

We also explored how governments and highly regulated sectors are preparing for this shift. BlackBerry today operates in a very different space than many people remember, focusing on identity-verified, mission-critical communications used by governments and institutions that cannot afford uncertainty. These systems are designed to operate during the moments that matter most, whether that involves cyber incident response, national security coordination, or emergency response to climate-related events.

Another theme that stood out was the leadership challenge behind quantum readiness. Nate believes organizations should avoid treating quantum as a separate security initiative. Instead, it should be integrated into the technology refresh cycles that companies already manage, including hardware updates, software upgrades, and certificate renewals. The organizations that begin asking the right questions today will avoid scrambling later when regulatory expectations tighten and deadlines arrive.

By the end of our conversation, one message became very clear. The first real defense in the post-quantum era may not come from stronger encryption alone. It may come from understanding and controlling the communication patterns and metadata that surround every digital interaction.

As quantum computing research accelerates and governments begin setting deadlines for post-quantum security readiness, the question becomes increasingly hard to ignore. Are organizations truly prepared for the communications challenges that the next decade may bring?

Jaksot(2000)

Turning AI Ambition Into Real Business Value

Turning AI Ambition Into Real Business Value

What does it really take to move AI from endless experimentation into something that creates real business value? In this episode, I sat down with Tom Alexander, Head of Innovation and Transformation ...

5 Huhti 30min

Adapting To Rising Costs And Constant Threats

Adapting To Rising Costs And Constant Threats

Is the endpoint still just a device, or has it quietly become one of the most important control points in modern enterprise security? Recording live from IGEL Now And Next in Miami, I sat down once ag...

5 Huhti 18min

The Rise Of Contextual Access And Adaptive Security

The Rise Of Contextual Access And Adaptive Security

What does it really take to move from talking about Zero Trust… to actually making it work in the real world? Recording live from IGEL Now And Next in Miami, I caught up with John Walsh for what has n...

4 Huhti 20min

When Recovery Takes Weeks: The Endpoint Problem With James Millington

When Recovery Takes Weeks: The Endpoint Problem With James Millington

How long would it actually take your organization to recover every endpoint after a major cyber incident? Recording live from IGEL Now And Next in Miami, I sat down with James Millington to explore a ...

3 Huhti 23min

The Convergence Of IT And OT With Matthias Haas At IGEL Now And Next

The Convergence Of IT And OT With Matthias Haas At IGEL Now And Next

What does it actually take to rethink the endpoint in a world shaped by AI, Zero Trust, and the growing convergence of IT and operational technology? Recording live from IGEL Now and Next in Miami, I ...

2 Huhti 26min

How Dwelly Is Rebuilding The Rental Market With AI

How Dwelly Is Rebuilding The Rental Market With AI

How do you rebuild an entire industry that most people accept as slow, fragmented, and frustrating? In this episode, I sit down with Dan Lifshits, co-founder of Dwelly, to explore how AI is being used...

1 Huhti 41min

How Meta Is Using AI To Help Businesses Connect, Create, And Compete

How Meta Is Using AI To Help Businesses Connect, Create, And Compete

How are businesses supposed to grow when technology is moving faster than regulation, customer expectations keep shifting, and AI is changing the rules in real time? In this episode, I sat down with D...

31 Maalis 36min

Nutanix, AI And Containers: Preparing For A Distributed Data Future

Nutanix, AI And Containers: Preparing For A Distributed Data Future

What happens when AI ambition starts moving faster than the infrastructure built to support it? In this episode, I spoke with Lee Caswell, SVP of Product and Solutions at Nutanix, about the latest Ent...

30 Maalis 27min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
ootsa-kuullut-tasta-2
rss-ootsa-kuullut-tasta
tervo-halme
rss-podme-livebox
rss-vaalirankkurit-podcast
rss-asiastudio
otetaan-yhdet
rss-raha-talous-ja-politiikka
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rss-sinivalkoinen-islam
rss-hyvaa-huomenta-bryssel
aihe
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit
rss-girls-finish-f1rst
rss-kovin-paikka
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset