{"version":"1.0","provider_name":"Commvault - English - United States","provider_url":"https:\/\/www.commvault.com","author_name":"klisun","author_url":"https:\/\/www.commvault.com\/blogs\/author\/klisun","title":"Future-Proofing Your Data: Post-Quantum Cryptography and Beyond\u00a0","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"nMvqpKAboB\"><a href=\"https:\/\/www.commvault.com\/blogs\/future-proofing-your-data-post-quantum-cryptography-and-beyond\">Future-Proofing Your Data: Post-Quantum Cryptography and Beyond\u00a0<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.commvault.com\/blogs\/future-proofing-your-data-post-quantum-cryptography-and-beyond\/embed#?secret=nMvqpKAboB\" width=\"600\" height=\"338\" title=\"&#8220;Future-Proofing Your Data: Post-Quantum Cryptography and Beyond\u00a0&#8221; &#8212; Commvault - English - United States\" data-secret=\"nMvqpKAboB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/05\/PQC-Blog.png","thumbnail_width":1200,"thumbnail_height":628,"description":"Like all relationships, our relationship with our customers is built on trust. You trust us with handling and securing the life blood of your company \u2013 your data. Behind the scenes, this trust relies heavily on cryptography, the art of scrambling information to keep it safe from malicious actors. But what happens when the tools we use to secure our data become vulnerable?\u00a0\u00a0"}