Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»CISA Releases List of Post-Quantum Cryptography Product Categories
News

CISA Releases List of Post-Quantum Cryptography Product Categories

Team-CWDBy Team-CWDJanuary 26, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The US Cybersecurity and Infrastructure Security Agency (CISA) has published an initial list of hardware and software product categories that support or are expected to support post-quantum cryptography (PQC) standards.

The list aims to guide organizations in planning PQC adoption and shaping technology investment strategies amid the rise of quantum computing.

The release follows Executive Order 14306, issued on June 6 2025, by President Trump through CISA, to identify widely available products using PQC standards.

CISA collaborated closely with the National Security Agency (NSA) to compile the list, which will be regularly updated to reflect developments in quantum-resistant technologies.

“The advent of quantum computing poses a real and urgent threat to the confidentiality, integrity and accessibility of sensitive data – especially systems that rely on public-key cryptography,” Madhu Gottumukkala, Acting Director of CISA, said.

“To stay ahead of these emerging risks, organizations must prioritize the procurement of PQC-capable technologies. This product categories list will support organizations making that critical transition.”

What’s Included in the List

CISA’s list focuses on technologies either already implementing PQC standards or transitioning toward them. Categories include cloud services, collaboration and web software, endpoint security, and networking hardware and software. Each category incorporates PQC for key cryptographic functions, including:

  • Key establishment, which ensures secure, encrypted communication

  • Digital signatures, which verify authenticity and data integrity

Read more on quantum-resistant cryptography: Quantum Computers Are Coming for Your Crypto Keys, But Not Yet

Products currently widely available include platform- and infrastructure-as-a-service (PaaS and IaaS) cloud solutions, web browsers, messaging software and endpoint security tools such as full-disk encryption.

Additional categories are still transitioning, including networking hardware, identity and access management (IAM) systems, and enterprise security software.

CISA emphasized that organizations should acquire only PQC-capable products within the listed categories when planning future procurements. The agency also noted that automated cryptographic discovery tools and nontraditional IT products, such as operational technology (OT) and Internet of Things (IoT) devices, are outside the current scope.

By providing a clear framework for PQC adoption, CISA aims to help federal agencies, industry partners and other organizations prepare for a future in which quantum computing could challenge existing encryption methods.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNorth Korea-Linked Hackers Target Developers via Malicious VS Code Projects
Next Article eScan Antivirus Supply Chain Breach Delivers Signed Malware
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

Can password managers get hacked? Here’s what to know

November 14, 2025

What it is and how to protect yourself

January 8, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.