✅ PQC is both about what your systems provide and what they use internally
In the latest episode of Shielded: The Last Line of Cyber Defense, Bruno Couillard explains why this matters: ✅ HSMs don’t just generate keys for applicatio...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Germany under the topic 'when they see us'.
About this video
In the latest episode of Shielded: The Last Line of Cyber Defense, Bruno Couillard explains why this matters:
✅ HSMs don’t just generate keys for applications, they secure their own most sensitive keys inside
✅ Internal cryptography underpins firmware updates, attestation, and sibling-to-sibling communication
✅ If an HSM isn’t PQC-ready inside, it doesn’t matter what algorithms it “provides” on the outside
As Bruno warns: “An HSM is a provider of cryptography, but the HSM has to use internally its own cryptographic capabilities because think of it as a safety deposit box for some of the most sensitive keys.”
🎧 Listen to the full conversation and see why PQC-ready and PQC-providing are two very different things:
YouTube: https://youtu.be/pD3L0YFypOQ
Spotify: https://bit.ly/48Vzl1o
Apple: https://apple.co/43cEXR8
#CyberSecurity #PostQuantum #PQC #QuantumComputing #ShieldedPodcast
Video Information
Views
522
Total views since publication
Likes
1
User likes and reactions
Duration
0:38
Video length
Published
Oct 9, 2025
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#post-quantum cryptography #hardware security modules #quantum safe technology #cryptographic migration #PKI security #crypto agility #HSM deployment #quantum ready vs quantum safe #cryptographic protocols #key management #digital signatures #hybrid cryptography #cybersecurity leadership #CISO strategy #security architecture #cryptography implementation #enterprise security planning #quantum risk mitigation #MLDSA implementation #SLHDSA deployment #cloud HSM solutions
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.