Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Qubits: Understanding Quantum Information Michelle Chalupnik Quantum technologies use quantum bits (qubits) to perform computations, manipulate information, and to send and receive data. While similar in functio... 1 week ago | 61 mins Scheduling Quantum Error Correction in Entanglement-based Secure Networks Keith Kenemer One challenge in building entanglement-based networks is the management of quantum errors, which occur due to the nature of the entanglement distribut... October 19, 2023 5:00pm Design, Visualize, and Troubleshoot Quantum Networks Michelle Fernandez and Michael Wood Quantum networks continue to gain traction with public sector organizations and interest with security-sensitive enterprises. Given the sophisticatio... 3 weeks ago | 60 mins How does quantum entanglement work inside a Quantum Network? Daniel Winton The day a quantum computer is capable of cracking the encryption we use everyday to keep our communications secure - from email to financial transacti... 2 months ago | 61 mins Deploying & Retrofitting IoT with Robust Post Quantum Solutions Ellen Boehm (Keyfactor) | Dave Madden (Thales) Companies can deploy Thales LUNA HSMs into their critical infrastructure to supercharge their cybersecurity implementation through the power of Keyfac... 1 month ago | 46 mins Navigating Post-Quantum Cryptography (PQC): Don't Panic, Prepare! Chris Hickman (Keyfactor) | Blair Canavan (Thales) Keyfactor’s Chief Security Officer (CSO) will present on tangible strategies and tactical execution to prepare for post-quantum cryptography. Specific... 2 months ago | 46 mins Cybersecurity in the Quantum Era: Quantum versus Quantum Dr. Bruno Huttner (ID Quantique) | Stan Mesceda (Thales) In this webinar, you will learn more about how quantum technologies can help fight the threat of quantum computers. In particular, we will discuss the... 2 months ago | 44 mins What is Q-Day? Michael Cubeddu In a few years, quantum computers will be able to break the encryption we use every day to keep our online communications private and secure. The day ... 2 months ago | 61 mins The Role of Quantum Teleportation in Entanglement-based Secure Networks Michelle Chalupnik Quantum Secure Communication, as achieved by Entanglement-based Secure Networks, relies on the physics of teleportation. Join Michelle Chalupnik, Res... 4 months ago | 61 mins Critical Success Factors When Building Post-Quantum Resilience Marion Le Masson (Quantinuum) | Blair Canavan (Thales) Learn about the critical factors to take into consideration when building Post-Quantum Resilient solutions. 2 months ago | 44 mins Load more