🌐 The Web’s Post-Quantum Future Is Closer Than You Think 🌐
Bas Westerbaan from Cloudflare says we’re approaching a tipping point: “It will be very soon that more than half of all traffic on the web will be secured w...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
Bas Westerbaan from Cloudflare says we’re approaching a tipping point:
“It will be very soon that more than half of all traffic on the web will be secured with post-quantum encryption… There’s a long road ahead for authentication, but we’ll get there too.”
In this episode of Shielded: The Last Line of Cyber Defense, we dive into:
✅ Why PQC-secured web traffic will hit majority share sooner than expected.
✅ The authentication gap that still needs solving, and how the industry is closing in.
✅ What Year One has taught us about scaling PQC from niche deployments to the global web.
💡 The takeaway? The encryption shift is happening faster than most realize. The question isn’t if you’ll need to be PQC-ready, it’s whether you’ll be ready in time.
🎧 Hear Bas’s full perspective:
👉 Spotify: https://bit.ly/45xFehR
👉 Apple Podcasts: https://apple.co/3Hy590X
👉 YouTube Podcasts: https://youtu.be/yICLRjLum9g
#PostQuantum #CyberSecurity #PQC #QuantumComputing #ShieldedPodcast
Video Information
Views
621
Total views since publication
Likes
2
User likes and reactions
Duration
0:17
Video length
Published
Aug 19, 2025
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#post-quantum cryptography #PQC migration #quantum security standards #cryptographic transition #NIST standards #crypto agility #FIPS validation #cryptographic algorithms #Kyber #Dilithium #harvest now decrypt later #HSM implementation #regulatory compliance #critical infrastructure protection #cybersecurity leadership #security architecture #cryptography implementation #quantum readiness #compliance planning #risk mitigation strategy #enterprise security
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.