Tech »  Topic »  Taming Cryptographic Sprawl in a Post-Quantum World

Taming Cryptographic Sprawl in a Post-Quantum World


Entrust's Hann Says Visibility, Control Are Key to Managing Cryptographic Asset Mathew J. Schwartz (euroinfosec) • June 11, 2025

Cryptography protects everything from databases to user access. But most organizations have created a tangled mess of keys, certificates and protocols, making it nearly impossible to manage their cryptographic estate effectively, according to Robert Hann, global vice president of technical solutions at Entrust. This complexity leads to limited visibility, poor control and greater exposure to cyberthreats.

Attackers aren't trying to break encryption anymore. They're stealing credentials, exploiting inadequate controls and fragmented systems.

"Stealing cryptographic keys is very advantageous," Hann said. "You get far more than just stealing a password from a user. Once you have the key, you have the keys to the kingdom."

Visibility is the critical first step. A centralized platform helps identify cryptographic assets, manage them intelligently and assess risk continuously. Entrust's Cryptographic Security Platform ...


Copyright of this story solely belongs to bankinfosecurity . To see the full text click HERE