Insights That Keep You Ahead of Cyber Threats

Frontline Analysis from Our Experts — For IT Leaders & Decision Makers

How do attackers really think? What does a new vulnerability actually mean for your business? The AKATI Sekurity Insights Blog is where our experts answer the hard questions — publishing frontline analysis and forensic discoveries to give you the practical, technical, and strategic knowledge you need to build a stronger defence.

AI & Deepfakes Ransomware Cloud Security Identity & Zero Trust Supply Chain IoT & OT Regulatory & Governance SOC Strategy
Joanna Woon SC. Joanna Woon SC.

Harvest Now, Decrypt Later

Your encrypted data does not need to be readable today to be stolen today. The attack strategy known as Harvest Now, Decrypt Later (HNDL) involves adversaries collecting and archiving encrypted corporate data now, then decrypting it once quantum computers become capable of breaking RSA and elliptic curve cryptography, a threshold most experts place between 2029 and 2033.

Read More