{"id":16068,"date":"2023-11-16T16:22:04","date_gmt":"2023-11-16T14:22:04","guid":{"rendered":"https:\/\/www.thegreenbow.com\/?post_type=resource&#038;p=16068"},"modified":"2024-01-25T12:19:59","modified_gmt":"2024-01-25T10:19:59","slug":"keeping-the-it-supply-chain-secure-a-considerable-challenge-for-2024","status":"publish","type":"resource","link":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/","title":{"rendered":"Keeping the IT supply chain secure\u2014a considerable challenge for 2024"},"content":{"rendered":"\n<div class=\"wp-block-ch-resource-content alignfull\">\n<p><strong>Author: Arnaud DUFOURNET<\/strong>, Chief Marketing Officer<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Supply-chain attacks are rocketing. According to the <a href=\"https:\/\/resources.checkpoint.com\/cyber-security-resources\/2022-cyber-security-report\">2022 Cyber Security Report<\/a>, published annually by Check Point, such attacks saw a spectacular increase of 650% in 2021 compared to the previous year. Pessimistically, Gartner predicted in 2021 that \u201cby 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains.\u201d<\/h5>\n\n\n\n<h5 class=\"wp-block-heading\">In response to this widespread intensification of cyber threats, the European Union has built up a whole arsenal of legislation in recent months, with a veritable bundle of new regulations and directives, including the NIS&nbsp;1 and NIS&nbsp;2 Directives, the Critical Entities Resilience Directive (CER), the DORA regulation for the financial sector, Part-IS for aviation, and the proposed Cyber Resilience Act (CRA). Maintaining the security of third-party service providers, and thus of the supply chain, has become a recurring theme within the new requirements created in these regulations and directives, with far-reaching practical implications on the relationship between regulated entities and IT service providers.<\/h5>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong>What is a supply-chain attack?<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p>Over recent years, the large corporations that make use of outsourcing have upped their cyber-resilience game considerably, forcing cybercriminals to find other ways into their networks. Consequently their subcontractors, often being less well protected, are increasingly now the attack targets. The connections that exist between systems and the high level of IT subcontracting in certain sectors such as banking explain the huge growth in this type of attack.<\/p>\n\n\n\n<p>The principle is quite straightforward\u2014a supply-chain attack is an indirect attack via IT service providers, i.e. the suppliers of software, applications or services. Cyber attackers use these subcontractors to gain access to their real target. The most common methods used are to compromise the source code of open-source software or components used by such service providers (e.g. the NotPetya malware), or the theft of credentials giving access to the subcontractor\u2019s software. Exploiting zero-day vulnerabilities (such as Log4J) and downloading malware-infected updates to open-source components are typically the starting point for these attacks.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:43% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Data-Leakage_lite-1024x576.jpg\" alt=\"\" class=\"wp-image-16074 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Data-Leakage_lite-1024x576.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Data-Leakage_lite-300x169.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Data-Leakage_lite-768x432.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Data-Leakage_lite-1536x864.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Data-Leakage_lite-2048x1152.jpg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Data-Leakage_lite-100x56.jpg 100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>The aim is to steal confidential data, gain access to highly sensitive environments, or to take control remotely over specific systems, with the ultimate objective being industrial espionage, extortion, or causing some kind of instability. Often complex and sophisticated, these attacks are generally the work of state-backed organizations or powerful criminal organizations.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>The targets most exposed to this type of attack are Managed Service Providers (MSPs), major software vendors, and IT hardware suppliers. They have their clients\u2019 trust, and all the more so when they are supplying cybersecurity solutions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong>New regulatory requirements<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p>One key feature shared by the latest regulations (<strong>NIS&nbsp;2<\/strong> and <strong>DORA<\/strong>) adopted by the European Union is that they both address the issue of IT supply chain resilience. When these regulations talk about data security and resilience, one imperative aspect that comes up time and again is the ability to guarantee the availability, authenticity, integrity, and confidentiality of data stored, transmitted, or processed.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 38%\"><div class=\"wp-block-media-text__content\">\n<p>As you might know, NIS&nbsp;2 will apply in EU Member States from October 17, 2024, and will affect around 100,000 organizations across the European Union, while DORA comes into force on January 18, 2025, and will apply to <strong>22,000 financial entities<\/strong>.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"611\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Exigences-reglementaires_lite-1024x611.jpg\" alt=\"Conformit\u00e9 NIS2\" class=\"wp-image-16078 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Exigences-reglementaires_lite-1024x611.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Exigences-reglementaires_lite-300x179.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Exigences-reglementaires_lite-768x458.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Exigences-reglementaires_lite-1536x916.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Exigences-reglementaires_lite-2048x1221.jpg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Exigences-reglementaires_lite-100x60.jpg 100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>These figures do not include subcontractors, but they too will have to match the security levels imposed on those of their clients falling within the remit of these regulations. In practical terms, the subcontractors stipulated are \u201cproviders of data storage and processing services or managed security service providers and software editors\u201d according to the terms of the NIS&nbsp;2 Directive. Essential or important entities are \u201cencouraged to incorporate cybersecurity risk-managementmeasures into contractual arrangements with their direct suppliers and service providers.\u201d<\/p>\n\n\n\n<p>Regulated entities are evidently expected to organize the resilience of their IT supply chains by means of contract provisions. In France, the French National Cybersecurity Agency (ANSSI) is responsible for transposing the Directive and its new head, Vincent Strubel, announced at the <a href=\"https:\/\/www.youtube.com\/watch?v=SB0RDTT19eQ\">Assises de la cybers\u00e9curit\u00e9<\/a>, a French industry event for cybersecurity experts, that a bill would be presented in the spring of 2024, which will shed more light on the cybersecurity measures that regulated entities and their IT service providers will need to implement if they are to comply with NIS&nbsp;2.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the impacts for IT service providers?<\/h2>\n\n\n\n<p>IT service providers currently working with regulated entities (or those soon to become regulated) are obviously not all starting from the same level as regards managing cyber risks. For example, IT services and consulting firms that handle the information systems of critical market operators are already a long way down this road. The EU Regulations will, however, add additional contractual pressure, and increase the need to work together with their clients.<\/p>\n\n\n\n<p>The HR impact should not be overlooked, because lasting resilience has to entail perpetual maintenance of skills and knowledge, and that means regular training. In a sector suffering from a talent shortage and high staff turnover, this is undoubtedly a considerable challenge to meet. As regards software vendors, those who are already involved in regular certification\/assessment processes with cybersecurity agencies are suitably prepared to meet these regulatory requirements. This applies to TheGreenBow, for example. Having first obtained ANSSI\u2019s standard qualification and NATO Restricted approval for its Windows VPN Client back in 2013, TheGreenBow is accustomed to being regularly audited and tested on its ability to put trustworthy software on the market.<\/p>\n\n\n\n<p>Efforts will have to be redoubled, however, in terms of vulnerability intelligence gathering, and indeed communication and transparency. On this topic, France\u2019s new <strong>Military Spending Bill<\/strong> (LPM) for 2024\u20132030 published in the country\u2019s official gazette on August 2, 2023, goes further by imposing a duty of transparency on software vendors when vulnerabilities are found, including in embedded open-source libraries and components. Article&nbsp;66 stipulates that \u201cin the event of an IT incident compromising the security of their information systems and likely to have a significant impact on one of their products,\u201d vendors are required to inform ANSSI and all of their clients. The <a href=\"https:\/\/www.thegreenbow.com\/en\/company\/news\/log4shell-security-notice-thegreenbow-vpns-not-affected\/\">Log4Shell vulnerability<\/a> (affecting the Log4J logging utility) discovered in December 2021 is a textbook case. Although not affected, TheGreenBow published a security notice to keep its clients informed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the new requirements for compliance of security of remote communications?<\/h2>\n\n\n\n<p>The NIS Directive once again reiterates the need to protect communications by using encryption. ANSSI\u2019s <a href=\"https:\/\/cyber.gouv.fr\/en\/publications\/guideline-healthy-information-system-42-measures\">Guideline for a Healthy IS<\/a>, which is highly likely to be used once again as a baseline for the security measures to be implemented, recommends using<a href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/why-choose-ipsec-vpns-over-ssl-tls-vpns\/\" target=\"_blank\" rel=\"noreferrer noopener\"> IPsec VPN tunnels<\/a> to protect remote connections to information systems. What does this mean in terms of requirements from service providers? Given that communications have to continue in the event of an incident, their wisest course of action is to turn to the most robust and reliable cybersecurity solutions, i.e. those holding security certifications and labels from authorities around the world.<\/p>\n\n\n\n<p>As regards the use of VPN tunnels to access the information systems of regulated entities, IT service providers must become more agile and flexible when it comes to tunnel management, and especially how they are configured. Jumping from one client\u2019s information system to the next, allowing for various employees and hardware components to access those systems, and still providing a high level of security will most certainly require some dexterity.<\/p>\n\n\n\n<p>To meet this challenge, TheGreenBow has made its VPN clients compatible with the <a href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/a-quoi-sert-le-referentiel-ipsec-dr\/\"><strong>IPsec DR framework<\/strong><\/a> published by ANSSI in the spring of 2023 (only available in French), and submitted a fresh certification\/assessment request for its Windows client. Also with a view to further enhance the level of trust, last year, TheGreenBow started developing <a href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/think-ztna-and-vpns-are-incompatible-think-again\/\"><strong>features based on the ZTNA approach<\/strong><\/a> that work in conjunction with IPSec tunnels. For example, the Windows Enterprise VPN Client\u2019s filtering mode allows for DNS filtering that can block command-and-control attacks, which may be concealed in software updates.<\/p>\n\n\n\n<p>Lastly, to meet clients\u2019 and users\u2019 needs for flexibility and segmentation, TheGreenBow has launched the<strong> <a href=\"https:\/\/www.thegreenbow.com\/en\/products\/connection-management-center\/\">Connection Management Center<\/a><\/strong>. This console is specifically designed to create, centralize, and quickly distribute VPN configurations. It also aims to manage security rules based on the zero trust principle that determine how and when to open a tunnel, such as checking endpoint compliance when a remote connection is requested. IT supply chain security and ensuring compliance with the new regulations give rise to a number of questions. We were able to gauge just how many during our workshop at the <strong>Assises 23 <\/strong>cybersecurity industry event on this very subject. Moreover, a day of presentations will be devoted to this topic during the <a href=\"https:\/\/www.european-cyber-week.eu\/programme?lang=en\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>European Cyber Week<\/strong><\/a>, at which the TheGreenBow will have a stand to answer attendees\u2019 questions and discuss their plans.<\/p>\n\n\n\n\n\n  <section  class=\"wp-block-acf-linked-pages  section-content linked-pages-section\"  itemprop=\"hasPart\" itemscope itemtype=\"https:\/\/schema.org\/WebPageElement\">\n    <div class=\"grid-container\">\n     <div class=\"grid-x grid-padding-x align-center mobile-slider\">\n                <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-727x486.jpg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-301x201.jpg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-343x229.jpg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-1454x972.jpg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-602x402.jpg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-686x458.jpg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:727,&quot;h&quot;:486},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:1454,&quot;h&quot;:972},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:686,&quot;h&quot;:458}}\"  alt=\"Keeping the IT supply chain secure\u2014a considerable challenge for 2024\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Migration to quantum-resistant cryptography<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n                  <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/ebook\/cryptography-at-the-core-of-the-quantum-revolution\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/ebook-Quantum-resistant-Cryptography-EN-.jpg-595x398.png, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/ebook-Quantum-resistant-Cryptography-EN-.jpg-301x201.png, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/ebook-Quantum-resistant-Cryptography-EN-.jpg-343x229.png, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/ebook-Quantum-resistant-Cryptography-EN-.jpg-595x398.png, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/ebook-Quantum-resistant-Cryptography-EN-.jpg-595x397.png, medium_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:595,&quot;h&quot;:398},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:595,&quot;h&quot;:398},&quot;medium_retina&quot;:{&quot;w&quot;:595,&quot;h&quot;:397},&quot;large_retina&quot;:{&quot;w&quot;:595,&quot;h&quot;:397}}\"  alt=\"Keeping the IT supply chain secure\u2014a considerable challenge for 2024\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Cryptography at the core of the Quantum revolution<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n                  <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-727x486.jpg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-301x201.jpg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-343x229.jpg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-1454x972.jpg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-602x402.jpg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-686x458.jpg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:727,&quot;h&quot;:486},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:1454,&quot;h&quot;:972},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:686,&quot;h&quot;:458}}\"  alt=\"Keeping the IT supply chain secure\u2014a considerable challenge for 2024\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Migrating to PQC: why you should start now<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n        \n\t\t<\/div>\n    <\/div>\n  <\/section>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<\/div>\n","protected":false},"featured_media":16070,"template":"","meta":{"_acf_changed":false,"resource_type":"internal"},"resource_category":[342],"class_list":["post-16068","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keeping the IT supply chain secure\u2014a considerable challenge for 2024 - TheGreenBow<\/title>\n<meta name=\"description\" content=\"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping the IT supply chain secure\u2014a considerable challenge for 2024 - TheGreenBow\" \/>\n<meta property=\"og:description\" content=\"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/\" \/>\n<meta property=\"og:site_name\" content=\"TheGreenBow\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-25T10:19:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks_Lite-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@thegreenbow\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\\\/\",\"name\":\"Keeping the IT supply chain secure\u2014a considerable challenge for 2024 - TheGreenBow\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Supply-Chain-Attacks_Lite-scaled.jpg\",\"datePublished\":\"2023-11-16T14:22:04+00:00\",\"dateModified\":\"2024-01-25T10:19:59+00:00\",\"description\":\"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Supply-Chain-Attacks_Lite-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Supply-Chain-Attacks_Lite-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Supply Chain Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/resources\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Keeping the IT supply chain secure\u2014a considerable challenge for 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"name\":\"TheGreenBow\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\",\"name\":\"TheGreenBow\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"width\":422,\"height\":84,\"caption\":\"TheGreenBow\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thegreenbow\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/thegreenbow\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCZKtI7_fmgFcmovgGSy8AnQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keeping the IT supply chain secure\u2014a considerable challenge for 2024 - TheGreenBow","description":"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/","og_locale":"en_US","og_type":"article","og_title":"Keeping the IT supply chain secure\u2014a considerable challenge for 2024 - TheGreenBow","og_description":"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.","og_url":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/","og_site_name":"TheGreenBow","article_modified_time":"2024-01-25T10:19:59+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks_Lite-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@thegreenbow","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/","url":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/","name":"Keeping the IT supply chain secure\u2014a considerable challenge for 2024 - TheGreenBow","isPartOf":{"@id":"https:\/\/www.thegreenbow.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/#primaryimage"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks_Lite-scaled.jpg","datePublished":"2023-11-16T14:22:04+00:00","dateModified":"2024-01-25T10:19:59+00:00","description":"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.","breadcrumb":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/#primaryimage","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks_Lite-scaled.jpg","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks_Lite-scaled.jpg","width":2560,"height":1707,"caption":"Supply Chain Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thegreenbow.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.thegreenbow.com\/en\/resources\/blog-en\/"},{"@type":"ListItem","position":3,"name":"Keeping the IT supply chain secure\u2014a considerable challenge for 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.thegreenbow.com\/en\/#website","url":"https:\/\/www.thegreenbow.com\/en\/","name":"TheGreenBow","description":"","publisher":{"@id":"https:\/\/www.thegreenbow.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thegreenbow.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.thegreenbow.com\/en\/#organization","name":"TheGreenBow","url":"https:\/\/www.thegreenbow.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","width":422,"height":84,"caption":"TheGreenBow"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/thegreenbow","https:\/\/fr.linkedin.com\/company\/thegreenbow","https:\/\/www.youtube.com\/channel\/UCZKtI7_fmgFcmovgGSy8AnQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource\/16068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media\/16070"}],"wp:attachment":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media?parent=16068"}],"wp:term":[{"taxonomy":"resource_category","embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource_category?post=16068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}