惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

GbyAI
GbyAI
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
P
Proofpoint News Feed
L
Lohrmann on Cybersecurity
S
Secure Thoughts
Attack and Defense Labs
Attack and Defense Labs
人人都是产品经理
人人都是产品经理
Stack Overflow Blog
Stack Overflow Blog
W
WeLiveSecurity
O
OpenAI News
SecWiki News
SecWiki News
博客园 - Franky
NISL@THU
NISL@THU
Microsoft Azure Blog
Microsoft Azure Blog
T
Tor Project blog
Microsoft Security Blog
Microsoft Security Blog
aimingoo的专栏
aimingoo的专栏
Security Latest
Security Latest
H
Hacker News: Front Page
Google Online Security Blog
Google Online Security Blog
P
Privacy & Cybersecurity Law Blog
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
D
Darknet – Hacking Tools, Hacker News & Cyber Security
月光博客
月光博客
李成银的技术随笔
Spread Privacy
Spread Privacy
F
Full Disclosure
F
Fortinet All Blogs
T
The Exploit Database - CXSecurity.com
Vercel News
Vercel News
AWS News Blog
AWS News Blog
WordPress大学
WordPress大学
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
V
Visual Studio Blog
J
Java Code Geeks
博客园 - 三生石上(FineUI控件)
G
Google Developers Blog
云风的 BLOG
云风的 BLOG
博客园 - 司徒正美
Engineering at Meta
Engineering at Meta
Last Week in AI
Last Week in AI
P
Palo Alto Networks Blog
宝玉的分享
宝玉的分享
T
True Tiger Recordings
N
News and Events Feed by Topic
酷 壳 – CoolShell
酷 壳 – CoolShell
Cisco Talos Blog
Cisco Talos Blog
N
News | PayPal Newsroom
S
SegmentFault 最新的问题
Jina AI
Jina AI

Forbes - Innovation

Securing The Internet’s Humanity Netflix’s Best New Show Lands A Perfect Rotten Tomatoes Score As A Final Duffer Bros. Effort AI Might Not Bring On A Job Crisis, But A Workforce ‘Mismatch’ Could Do Your AI Agents Have Governance? Most Don’t, And They’re Live Why Complexity Is The Insider Threat Hiding In Plain Sight ‘Supergirl’ Is Starting To Feel Like It May Be A Big DCU Miss Google Confirms 2 Critical New Flaws—How To Jump The Update Queue Google Splits Its Agent Strategy For Two Developer Audiences Rethinking GRC In The Tokenized Economy ‘The Boys’ Series Finale Review Scores Are Way Under ‘Stranger Things’ Autonomous Data Stewardship: How AI Agents Are Redefining Master Data Management In Financial Services A Small Business Guide To Understanding Multistate Tax Obligations Why Performance Has Become The New Currency In Advertising The Plan For FEMA Reform, Less People In D.C.,More Responsibility For States There’s A Way ‘Gen V’ May Now Live On After ‘The Boys’ Finale Garmin Cirqa Price May Be Far Higher Than Expected Securing AI Cloud Systems: Intelligent Testing For Intelligent Systems 2 New Microsoft Defender Zero-Days Exploited—Patch Now Rolling Out 2 Tell-Tale Signs Of ‘Fake Love’ In A Relationship, By A Psychologist California Lets Cops Give Tickets To Robocars, Which Is Ridiculous Why Do Humans Have Unique Voices? An Evolutionary Biologist Explains The Anatomy That Makes You Unmistakable Of All The Professions AI Is Disrupting, Accounting Has The Worst Math How Connected Reporting And Dynamic Waterfalls Reshape Fund Services Humanoid’s New Deal: Bosch Will Build Its Robots With Schaeffler Parts The New Resilience Part 2: Evolving Best Practices In AI And IIoT ​How AI Is Changing The Economics Of Integration ​Why The Cheapest AI Stack Becomes The Most Expensive At Scale The New Surgeon General Advisory On The Harms Of Screen Use— Here’s What The Science Says About Risks And Benefits Developing An Executive Cybersecurity Strategy For Directors Stop Measuring AI Spend, Start Measuring Impact AI Agents Belong In Your Identity Program How SMEs Unlock Greater Value From AI Why Small, Elite Teams Outperform Big Ones If You Value Online Security Stop Using Public Wi-Fi Hotspots Demystifying Success: A Practical Approach To Guiding Your Business Are Financial Institutions Failing To Back The Low-Carbon Economy? Airbnb CEO Brian Chesky Called Chinese AI Fast And Cheap. Now, Congress Wants Answers The Neurotech CRO: Kordata Launches To Power Next-Gen Clinical Trials Latest AI Behaves More Like Humans By Rudely Interrupting You During Conversational Chats And We Might Relish It Google I/O 2026 Turned Gemini Into An Agent Platform Advanced Packaging Leads The Way To Intel Foundry Success From AI Policies To AI Literacy In Education Today’s Wordle #1797 Hints And Answer For Thursday, May 21 NYT ‘Pips’ Hints, Answers And Walkthrough For Thursday, May 21 Meta Expands Its Creator Ecosystem With Instagram’s New Instants App 4 Factors That Strongly Influence First Impressions, By A Psychologist ‘The Boys’ Series Finale Is A Crushing Disappointment ‘Escape From Tarkov’ Icebreaker Delayed As Current Event Extended Class Of 2026 Faces A Hard Truth: AI Isn’t The Threat—Ignoring It Is What Google’s Universal Cart Launch Means For AI-Led Shopping The $150 Trillion Question—What Is AI’s Value In Asset Management A Third-Wave Philanthropy Unlocked By AI Could Supercharge Federal R&D Top Frontier AI Models Top Out At C+ ... Barely Better Than Old Models Google Wants Search To Stop Answering And Start Acting Quordle Hints Today: Thursday, May 21 Clues And Answers NYT Strands Hint Today: Thursday, May 21 Clues And Answers (In A Material World) NYT Connections Hints Today: Thursday, May 21 Clues And Answers (#1,075) NYT Connections Answers Explained For Thursday, May 21 (#1,075) Why Infrastructure Modernization Is The Real Enabler Of AI The ‘Concord’ Curse Returns With Quantic Dream’s PvP Game Axed In 3 Months ‘Obsession,’ Now Going Viral, Just Set A 17-Year Box Office Record ‘The Boys’ Series Finale Review: Last Second Salvation Inside Incyte’s $120 Million AI For Drug Development Deal Samsung Galaxy Z Fold 8: Bad Crease News, No Display Upgrade The Robot Revolution Has Officially Begun When Insurance Disappears, Economies Follow. The G7 Has A Unique Opportunity To Act Solving The Identity Crisis: Putting Today’s Fragmented Consumer Back Together Private Equity-Owned Retinal Practices Perform Fewer Retinal Detachment Procedures Some Private Equity Firms Would Rather Let People Go Blind Than Reduce Their Profits How To Mitigate The Microsoft Windows BitLocker ‘Angry Hacker’ 0-Day ‘Off Campus’ Has Set A Rotten Tomatoes Score Record For The Past Year E-Cigarettes Can Help You Quit Smoking Says New Study Netflix’s Best New No. 1 Show Lands A 90% Rotten Tomatoes Score 2 Stubborn Habits That Predict Long-Term Success, By A Psychologist The AI-Native Human: What You Must Become To Stay Relevant GitHub Says 3,800 Repositories Breached—TeamPCP Hackers Demand $50,000 Vibe Hunting: A New Way Of Threat Hunting With AI Your AI Is Getting Smarter. But Whose Intelligence Is It Building? How 24/7 Renewables Are Ending Fossil Fuel Reliability ​Behind Vertical AI: What AI Is Already Demanding Of Energy And Utilities How The ARISE Network Is Rethinking Clinical AI Meet The Star-Nosed Mole — The Fastest Hunter On The Planet It’s Time To Rethink Data Retention In Healthcare The Intelligence Infrastructure Behind AI Agents The Next Phase Of Enterprise AI: Why LLM Consolidation Is Inevitable ​The Software Coordination Tax: Why Your 40-Engineer Team Is Shipping Like 25 Beyond The ‘Build Versus Buy’ Trap: Agentic Orchestration​'s Role In The Future Of GTM Demystifying Success: A Practical Approach To Guiding Your Business The Identity Crisis Your Security Team Didn't See Coming The End Of The Server Room: What Happens When Your Cameras Start Modernizing Legacy Industries And Multi-Partner Coordination Why Pharma Boards Confuse Scenario Models With Risk Measurements Your Company Is Measuring AI Adoption Wrong. Track This Instead. China Has Outspent The U.S. On Research For The First Time. 3,375 American Scientists Are Telling Congress To Pay Attention Why Americans Are Turning Against Data Centers Climate Advisers Call For Maximum Workplace Temperature Rules In U.K. People Are Really Angry At AI Content Even If It Turns Out That AI Didn’t Produce It And The Content Was Actually Human Made Volvo EX60 Road Tested: Is This The Best Electric SUV Yet? Ugreen Packs A Punch With Its Latest Nexode And MagFlow Air Chargers Why AI Literacy Has Become A Boardroom And Investor Priority
Why Post-Quantum Compliance For Banks Starts In Containers
Mehran Farim · 2026-05-21 · via Forbes - Innovation

Mehran Farimani is CEO of RapidFort, one of the fastest-growing cybersecurity companies securing the global software supply chain.

getty

Financial institutions are under increasing pressure to prepare for post-quantum cryptography as global bodies like the G7 and Europol urge organizations to plan now for a complex, multiyear transition beginning toward the end of the decade.

This urgency follows the standardization of new quantum-resistant encryption algorithms by the National Institute of Standards and Technology (NIST), which provide a clear path forward but will take years to implement across modern stacks.

Considering the value and sensitivity of the data financial institutions hold and transmit, and the fact that attacks to steal information for future decryption are already underway via harvest now, decrypt later (HNDL) threats, the need to transition to post-quantum cryptography (PQC) standards is urgent.

However, too many institutions are working in the dark because most environments aren’t cryptographically visible. The challenge isn’t just adopting post-quantum algorithms; it's identifying where legacy cryptography lives across container images, third-party libraries and bloated software stacks.

You cannot migrate what you cannot see, and by the time you achieve that visibility and reduce your attack surface, the window to prepare will be much shorter than expected.

The quantum threat is on the doorstep.

While organizations begin migration, adversaries aren’t waiting for Q-Day, which is when quantum computers will be able to break current public-key encryption. Bad actors are preparing now with HNDL attacks, which involve stealing encrypted information with the aim of cracking it once quantum capabilities arrive.

Financial data is particularly vulnerable to this tactic, which has become widespread among malicious actors.

The SEC has cited projections that Q-Day could arrive as early as 2028. Forrester has called a practical quantum computer “plausible” by 2030. Whether the timeline is two years or seven, the data being exfiltrated right now will still be sensitive when it arrives.

Start where the risk is already visible: containers.

Containers are known to contain a range of vulnerabilities, making them a common entry point for adversaries when attempting to move laterally.

If containers are so often the first target for malicious actors, it stands to reason that they should be in the first line of defense. For security and DevSecOps leaders, they are also where cryptographic sprawl is most present and easiest to deal with.

Container images are built in layers, and each layer brings its own cryptographic dependencies and risks. A base image pulled 18 months ago might carry an OpenSSL version with known cipher vulnerabilities, and a third-party package added during a crunch might ship with its own dependencies, some of which implement legacy encryption standards.

During updates and continuous development, updated or added components can reintroduce deprecated components across dozens of services before it is noticed.

Without clear, continuous visibility into these hidden dependencies and unnecessary packages, organizations end up inheriting cryptographic issues they don’t realize are there.​

Visibility is a prerequisite.

The most important factor in the transition is visibility into and security of the software environment. A software bill of materials (SBOM) is easy to produce and provides the first step via a machine-readable list of software components that make up your software stack.

The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA) and 19 international cybersecurity organizations are already promoting SBOMs as essential to securing the digital supply chain.

But for PQC readiness, the value of an SBOM is not the inventory; it is using that inventory to eliminate what is unused during runtime. An SBOM is only as useful as the reduction in scope it enables: The fewer components requiring migration, the smaller your attack surface becomes.

Unnecessary packages and redundant components don’t just expand the attack surface; they clutter your view. Before you can begin migration, you need to know that what remains is necessary for the system or platform to properly run. That means reducing software sprawl first: identifying and removing unnecessary components and ensuring the inventory reflects the real production environment.

Organizations that skip this step may end up implementing cryptography across unnecessary software, increasing operational complexity and expanding exposure.

Visibility efforts also need to extend beyond the container. Dependencies don’t stop at the container, but they extend into other components in the software supply chain, including third-party integrations, SaaS dependencies, shadow IT and the upstream registries containers ultimately rely on.

If a dependency your container pulls from upstream has a vulnerability, that exposure will be carried throughout your environment. PQC migration requires tracing those dependencies and updating the cryptographic libraries and protocols they rely on, not just the components where encryption is most visible.

The time to start is yesterday.

Post-quantum migration is a multiphase effort and won't happen quickly. There are other steps involved in becoming quantum-ready, such as developing a clear implementation plan and testing PQC algorithms in a sandbox environment.

Organizations also need to ensure they can transition seamlessly from one set of algorithms (i.e., there are several NIST PQC algorithms and vendors) to another.

But it starts with visibility into your entire environment, including those components at the furthest reaches of the enterprise, such as containers. Transitioning to PQC standards requires that organizations establish a strong foundation. The key steps include:

Gain SBOM-level visibility. Build a complete inventory of software components and dependencies across your environment.

Remove unused software. Shrink the attack surface and reduce migration scope by identifying and eliminating unnecessary runtime components.

Eliminate known security vulnerabilities. Introduce hardened and curated images that eliminate the common vulnerabilities and exposures (CVEs) in the stacks.

Apply this process to development. Extend this process continuously to any new software introduced into the product, system or platform. ​

Finding the locations of every component that needs PQC algorithms is no easy task, but it can be done. Financial institutions that haven’t made progress on their own transitions should start now if they intend to meet the transition timelines already taking shape across the industry.​


Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?