<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>QuickZTNA Blog</title><description>Post-quantum ZTNA, compliance, and mesh VPN engineering notes. Primary-sourced, technical, and honest.</description><link>https://quickztna.com/</link><language>en-us</language><item><title>Top 10 Zero Trust Strategies for MSPs and IT Providers in 2026</title><link>https://quickztna.com/blog/top-10-msp-zero-trust-strategies/</link><guid isPermaLink="true">https://quickztna.com/blog/top-10-msp-zero-trust-strategies/</guid><description>MSPs managing dozens of client environments need zero trust that scales across tenants. Compare 10 strategies and tools purpose-built for the MSP zero trust model.</description><pubDate>Sat, 16 May 2026 00:00:00 GMT</pubDate><category>industry</category><category>msp</category><category>managed-service-provider</category><category>multi-tenant</category><category>zero-trust</category><category>ztna</category><author>QuickZTNA Engineering</author></item><item><title>Top 10 ZTNA Solutions for Manufacturing and Industrial IoT in 2026</title><link>https://quickztna.com/blog/top-10-ztna-manufacturing-iot/</link><guid isPermaLink="true">https://quickztna.com/blog/top-10-ztna-manufacturing-iot/</guid><description>OT and industrial IoT networks cannot use traditional VPN for secure access. Compare 10 ZTNA solutions built or adapted for manufacturing, ICS, and OT environments.</description><pubDate>Fri, 15 May 2026 00:00:00 GMT</pubDate><category>industry</category><category>manufacturing</category><category>industrial-iot</category><category>ot-security</category><category>ics</category><category>ztna</category><category>zero-trust</category><author>QuickZTNA Engineering</author></item><item><title>Top 10 Secure Remote Desktop Solutions in 2026</title><link>https://quickztna.com/blog/top-10-remote-desktop-secure-access/</link><guid isPermaLink="true">https://quickztna.com/blog/top-10-remote-desktop-secure-access/</guid><description>RDP exposure is the leading ransomware initial access vector. Compare 10 secure remote desktop solutions on security model, performance, and zero-trust integration.</description><pubDate>Thu, 14 May 2026 00:00:00 GMT</pubDate><category>comparison</category><category>remote-desktop</category><category>rdp</category><category>remote-access</category><category>zero-trust</category><category>ztna</category><author>QuickZTNA Engineering</author></item><item><title>Top 10 Kubernetes Access Control Tools in 2026</title><link>https://quickztna.com/blog/top-10-kubernetes-access-control/</link><guid isPermaLink="true">https://quickztna.com/blog/top-10-kubernetes-access-control/</guid><description>kubectl exec and cluster admin binding are the biggest Kubernetes security gaps. 10 access control tools ranked on RBAC enforcement, audit coverage, and zero trust.</description><pubDate>Wed, 13 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>kubernetes</category><category>kubernetes-security</category><category>rbac</category><category>zero-trust</category><category>cloud-native</category><author>QuickZTNA Engineering</author></item><item><title>Top 10 AI Security Tools for Enterprise Teams in 2026</title><link>https://quickztna.com/blog/top-10-ai-security-tools-2026/</link><guid isPermaLink="true">https://quickztna.com/blog/top-10-ai-security-tools-2026/</guid><description>AI is reshaping threat detection, policy enforcement, and access control. 10 AI-powered security tools ranked on real-world deployment value in 2026.</description><pubDate>Tue, 12 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>ai-security</category><category>machine-learning</category><category>threat-detection</category><category>anomaly-detection</category><category>zero-trust</category><author>QuickZTNA Engineering</author></item><item><title>Top 10 Database Access Control Tools for Zero Trust in 2026</title><link>https://quickztna.com/blog/top-10-database-access-control/</link><guid isPermaLink="true">https://quickztna.com/blog/top-10-database-access-control/</guid><description>Direct database access is the last firewall exception holding your zero-trust architecture together. 10 database access control tools ranked with honest trade-offs.</description><pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>database-access</category><category>zero-trust</category><category>dba-security</category><category>sql-access-control</category><category>ztna</category><author>QuickZTNA Engineering</author></item><item><title>Why We Ship Post-Quantum on the Free Tier: A Pricing Manifesto</title><link>https://quickztna.com/blog/post-quantum-free-tier-manifesto/</link><guid isPermaLink="true">https://quickztna.com/blog/post-quantum-free-tier-manifesto/</guid><description>Post-quantum cryptography protects against harvest-now-decrypt-later. That threat hits free-tier users too. Why QuickZTNA refuses to paywall quantum safety.</description><pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>pricing</category><category>manifesto</category><category>post-quantum</category><category>free-tier</category><category>philosophy</category><author>QuickZTNA Founders</author></item><item><title>Top 10 Just-In-Time Access Frameworks for Zero Trust in 2026</title><link>https://quickztna.com/blog/top-10-jit-access-frameworks/</link><guid isPermaLink="true">https://quickztna.com/blog/top-10-jit-access-frameworks/</guid><description>Standing privileges are the silent risk hiding in every IAM config. Compare 10 JIT access frameworks on workflow, integration depth, and compliance evidence.</description><pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate><category>compliance</category><category>jit-access</category><category>just-in-time</category><category>zero-trust</category><category>privileged-access</category><category>iam</category><author>QuickZTNA Engineering</author></item><item><title>The 2026 Post-Quantum Migration Timeline: Every Major Deadline on One Page</title><link>https://quickztna.com/blog/post-quantum-migration-timeline/</link><guid isPermaLink="true">https://quickztna.com/blog/post-quantum-migration-timeline/</guid><description>Post-quantum cryptography has a migration timeline set by regulators, standards bodies, and vendors. Every known deadline through 2035 with primary sources.</description><pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>post-quantum-timeline</category><category>migration</category><category>cnsa-2-0</category><category>nis2</category><category>cryptography</category><author>QuickZTNA Engineering</author></item><item><title>Top 10 Session Recording Tools for Compliance in 2026</title><link>https://quickztna.com/blog/top-10-session-recording-compliance/</link><guid isPermaLink="true">https://quickztna.com/blog/top-10-session-recording-compliance/</guid><description>Session recording for compliance audits, privileged account monitoring, and insider threat investigation. 10 tools compared on coverage and log integrity.</description><pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate><category>compliance</category><category>session-recording</category><category>compliance</category><category>privileged-access</category><category>audit-logging</category><category>zero-trust</category><author>QuickZTNA Engineering</author></item><item><title>17 ZTNA Metrics Every CISO Should Actually Track in 2026</title><link>https://quickztna.com/blog/ztna-metrics-for-cisos/</link><guid isPermaLink="true">https://quickztna.com/blog/ztna-metrics-for-cisos/</guid><description>Vendor decks quote ZTNA statistics you cannot verify. Your board wants metrics from your own environment. 17 that matter, with formulas and how to collect them.</description><pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>ztna-metrics</category><category>kpis</category><category>ciso</category><category>security-operations</category><category>measurement</category><author>QuickZTNA Engineering</author></item><item><title>Kubernetes Zero Trust: Replacing kubectl proxy With a Mesh</title><link>https://quickztna.com/blog/kubernetes-zero-trust/</link><guid isPermaLink="true">https://quickztna.com/blog/kubernetes-zero-trust/</guid><description>Developers on kubectl-proxy-plus-VPN hit pain at team scale. Kubernetes Zero Trust uses identity-aware mesh access, SPIFFE identities, and per-namespace policy instead.</description><pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>kubernetes</category><category>zero-trust</category><category>spiffe</category><category>mesh</category><category>technical</category><author>QuickZTNA Engineering</author></item><item><title>Top 10 Secrets Management Tools in 2026</title><link>https://quickztna.com/blog/top-10-secrets-management-tools-2026/</link><guid isPermaLink="true">https://quickztna.com/blog/top-10-secrets-management-tools-2026/</guid><description>API keys, tokens, and credentials don&apos;t belong in env files. 10 secrets management tools ranked on enterprise features, audit trails, and zero-trust integration.</description><pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>secrets-management</category><category>vault</category><category>api-keys</category><category>zero-trust</category><category>developer-security</category><author>QuickZTNA Engineering</author></item><item><title>Zero Trust for Healthcare: 200 Clinics Without a Hub</title><link>https://quickztna.com/blog/zero-trust-healthcare/</link><guid isPermaLink="true">https://quickztna.com/blog/zero-trust-healthcare/</guid><description>Healthcare has unusual network properties — distributed clinics, legacy medical devices, HIPAA, strict uptime. How Zero Trust architecture fits, concretely.</description><pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate><category>industry</category><category>healthcare</category><category>hipaa</category><category>zero-trust</category><category>distributed-networks</category><author>QuickZTNA Engineering</author></item><item><title>The Only Production-Ready Post-Quantum ZTNA Solution in 2026</title><link>https://quickztna.com/blog/only-pqc-ready-ztna-solution-2026/</link><guid isPermaLink="true">https://quickztna.com/blog/only-pqc-ready-ztna-solution-2026/</guid><description>QuickZTNA is the only commercial ZTNA product shipping live ML-KEM-768 (FIPS 203) encryption on every tunnel in 2026 — including the free tier.</description><pubDate>Thu, 07 May 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>post-quantum</category><category>ml-kem-768</category><category>fips-203</category><category>ztna</category><category>zero-trust</category><category>pqc</category><category>cnsa-2-0</category><category>harvest-now-decrypt-later</category><author>QuickZTNA Security Team</author></item><item><title>Top 10 DLP Solutions for Remote Teams in 2026</title><link>https://quickztna.com/blog/top-10-dlp-solutions-remote-teams/</link><guid isPermaLink="true">https://quickztna.com/blog/top-10-dlp-solutions-remote-teams/</guid><description>Data loss prevention for distributed workforces. 10 tools compared on coverage, deployment model, and zero-trust integration for remote teams.</description><pubDate>Thu, 07 May 2026 00:00:00 GMT</pubDate><category>comparison</category><category>dlp</category><category>data-loss-prevention</category><category>remote-teams</category><category>zero-trust</category><category>ztna</category><author>QuickZTNA Engineering</author></item><item><title>WireGuard vs OpenVPN vs IPsec: A 2026 Engineering Comparison</title><link>https://quickztna.com/blog/wireguard-vs-openvpn-vs-ipsec/</link><guid isPermaLink="true">https://quickztna.com/blog/wireguard-vs-openvpn-vs-ipsec/</guid><description>WireGuard, OpenVPN, and IPsec are the three VPN protocols that matter in 2026. Performance, security, code size, and operational simplicity compared.</description><pubDate>Thu, 07 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>wireguard</category><category>openvpn</category><category>ipsec</category><category>vpn</category><category>comparison</category><author>QuickZTNA Engineering</author></item><item><title>WireGuard Mesh Network: Zero to 100 Peers Without a Config File</title><link>https://quickztna.com/blog/wireguard-mesh-network/</link><guid isPermaLink="true">https://quickztna.com/blog/wireguard-mesh-network/</guid><description>Building a WireGuard mesh by hand becomes painful at about 10 peers. What breaks, why coordination servers exist, and how to scale to 100+ peers.</description><pubDate>Thu, 07 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>wireguard-mesh</category><category>wireguard</category><category>mesh-vpn</category><category>technical</category><author>QuickZTNA Engineering</author></item><item><title>SASE vs ZTNA vs SSE: Which Acronym Matters for a 50-Person Team?</title><link>https://quickztna.com/blog/sase-vs-ztna-vs-sse/</link><guid isPermaLink="true">https://quickztna.com/blog/sase-vs-ztna-vs-sse/</guid><description>SASE, ZTNA, and SSE overlap. This explains each term using Gartner&apos;s original definitions, shows how they relate, and recommends what a 50-person team actually needs.</description><pubDate>Wed, 06 May 2026 00:00:00 GMT</pubDate><category>fundamentals</category><category>sase</category><category>ztna</category><category>sse</category><category>fundamentals</category><author>QuickZTNA Engineering</author></item><item><title>What Is ZTNA? A Plain-English Guide to Zero Trust Network Access in 2026</title><link>https://quickztna.com/blog/what-is-ztna/</link><guid isPermaLink="true">https://quickztna.com/blog/what-is-ztna/</guid><description>Zero Trust Network Access replaces &apos;inside is trusted&apos; with &apos;every request is verified&apos;. Plain-English explanation of the history, mechanics, and how to build it.</description><pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate><category>fundamentals</category><category>ztna</category><category>zero-trust</category><category>nist-800-207</category><category>beyondcorp</category><category>fundamentals</category><author>QuickZTNA Engineering</author></item><item><title>ZTNA vs VPN: 8 Real Differences (With Diagrams)</title><link>https://quickztna.com/blog/ztna-vs-vpn/</link><guid isPermaLink="true">https://quickztna.com/blog/ztna-vs-vpn/</guid><description>ZTNA and VPN are often pitted against each other. The real picture is more nuanced. Here are the eight differences that actually matter when you choose — with diagrams.</description><pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate><category>fundamentals</category><category>ztna-vs-vpn</category><category>zero-trust</category><category>vpn</category><category>fundamentals</category><category>wireguard</category><author>QuickZTNA Engineering</author></item><item><title>Open-Source vs Managed ZTNA: A Decision Framework</title><link>https://quickztna.com/blog/open-source-vs-managed-ztna/</link><guid isPermaLink="true">https://quickztna.com/blog/open-source-vs-managed-ztna/</guid><description>Open-source ZTNA (OpenZiti, Headscale, NetBird) vs managed products. A decision framework that puts the trade-offs in engineering hours, not ideology.</description><pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate><category>comparison</category><category>open-source-ztna</category><category>managed-ztna</category><category>ztna</category><category>decision-framework</category><author>QuickZTNA Engineering</author></item><item><title>Device Posture Checks That Actually Catch Unmanaged Laptops</title><link>https://quickztna.com/blog/device-posture-checks/</link><guid isPermaLink="true">https://quickztna.com/blog/device-posture-checks/</guid><description>Most device-posture checks are checkbox exercises. Twelve signals that actually catch unmanaged laptops, how to enforce continuously, what auditors expect.</description><pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>device-posture</category><category>ztna</category><category>continuous-authentication</category><category>mdm</category><category>edr</category><author>QuickZTNA Engineering</author></item><item><title>SOC 2 Controls for Remote Access: 11 You&apos;ll Get Audited On</title><link>https://quickztna.com/blog/soc-2-remote-access-controls/</link><guid isPermaLink="true">https://quickztna.com/blog/soc-2-remote-access-controls/</guid><description>SOC 2 is based on AICPA&apos;s Trust Services Criteria. The 11 specific Common Criteria auditors test for VPN, ZTNA, and remote-work deployments.</description><pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate><category>compliance</category><category>soc-2</category><category>compliance</category><category>trust-services-criteria</category><category>ztna</category><category>remote-access</category><author>QuickZTNA Engineering</author></item><item><title>HIPAA-Compliant VPN in 2026: What the Rule Actually Says About Encryption</title><link>https://quickztna.com/blog/hipaa-compliant-vpn-2026/</link><guid isPermaLink="true">https://quickztna.com/blog/hipaa-compliant-vpn-2026/</guid><description>HIPAA encryption is &apos;addressable&apos;, not optional. The Security Rule technical safeguards for remote access, and what a HIPAA-aligned VPN looks like in 2026.</description><pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate><category>compliance</category><category>hipaa</category><category>healthcare</category><category>security-rule</category><category>vpn</category><category>ztna</category><author>QuickZTNA Engineering</author></item><item><title>Self-Hosting Headscale vs a Managed Coordination Server: Honest Total Cost</title><link>https://quickztna.com/blog/headscale-vs-managed-coordination/</link><guid isPermaLink="true">https://quickztna.com/blog/headscale-vs-managed-coordination/</guid><description>Headscale is an open-source Tailscale-compatible coordination server. Self-host saves subscription cost but adds operational cost. Honest total-cost model.</description><pubDate>Fri, 01 May 2026 00:00:00 GMT</pubDate><category>comparison</category><category>headscale</category><category>tailscale</category><category>self-host</category><category>mesh-vpn</category><category>total-cost</category><author>QuickZTNA Engineering</author></item><item><title>Cloudflare Access Alternatives for Teams That Want a Real Agent</title><link>https://quickztna.com/blog/cloudflare-access-alternatives/</link><guid isPermaLink="true">https://quickztna.com/blog/cloudflare-access-alternatives/</guid><description>Cloudflare Access is an edge-native identity proxy, not a device-agent mesh. If you need a real agent, data-plane control, or self-host — these alternatives.</description><pubDate>Thu, 30 Apr 2026 00:00:00 GMT</pubDate><category>comparison</category><category>cloudflare-access-alternative</category><category>ztna</category><category>mesh-vpn</category><category>wireguard</category><category>comparison</category><author>QuickZTNA Engineering</author></item><item><title>NetBird vs Tailscale vs QuickZTNA: A Developer-Focused Comparison</title><link>https://quickztna.com/blog/netbird-vs-tailscale-vs-quickztna/</link><guid isPermaLink="true">https://quickztna.com/blog/netbird-vs-tailscale-vs-quickztna/</guid><description>NetBird, Tailscale, and QuickZTNA — three WireGuard mesh products for developers. Architecture, licensing, features, and post-quantum posture compared.</description><pubDate>Thu, 30 Apr 2026 00:00:00 GMT</pubDate><category>comparison</category><category>netbird</category><category>tailscale</category><category>quickztna</category><category>wireguard</category><category>comparison</category><author>QuickZTNA Engineering</author></item><item><title>The Best Tailscale Alternatives in 2026: A Fair, Factual Comparison</title><link>https://quickztna.com/blog/tailscale-alternatives-2026/</link><guid isPermaLink="true">https://quickztna.com/blog/tailscale-alternatives-2026/</guid><description>Tailscale popularised mesh VPN. Honest comparison of the best Tailscale alternatives in 2026 by architecture, licensing, pricing, and post-quantum posture.</description><pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate><category>comparison</category><category>tailscale-alternative</category><category>mesh-vpn</category><category>ztna</category><category>wireguard</category><category>comparison</category><author>QuickZTNA Engineering</author></item><item><title>Twingate Alternative: 5 Options That Don&apos;t Lock You In</title><link>https://quickztna.com/blog/twingate-alternative/</link><guid isPermaLink="true">https://quickztna.com/blog/twingate-alternative/</guid><description>Twingate is an agent-based ZTNA. Looking for an alternative — for licensing, protocol, pricing, or post-quantum reasons? Five serious options in 2026.</description><pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate><category>comparison</category><category>twingate-alternative</category><category>ztna</category><category>mesh-vpn</category><category>comparison</category><category>wireguard</category><author>QuickZTNA Engineering</author></item><item><title>ANSSI PQC Transition Plan: France&apos;s Deadlines for Public Sector Networks</title><link>https://quickztna.com/blog/anssi-pqc-transition-plan/</link><guid isPermaLink="true">https://quickztna.com/blog/anssi-pqc-transition-plan/</guid><description>ANSSI, France&apos;s cyber agency, has a three-phase plan for post-quantum. What each phase requires and how to align ZTNA with ANSSI qualification.</description><pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate><category>compliance</category><category>anssi</category><category>france</category><category>post-quantum</category><category>qualification</category><category>compliance</category><author>QuickZTNA Engineering</author></item><item><title>BSI TR-02102-1 and Post-Quantum: Germany&apos;s 2026 Crypto Baseline</title><link>https://quickztna.com/blog/bsi-post-quantum-transition-2026/</link><guid isPermaLink="true">https://quickztna.com/blog/bsi-post-quantum-transition-2026/</guid><description>Germany&apos;s BSI TR-02102-1 sets the cryptographic baseline for federal and regulated entities. Current recommendations, PQ transition, and what it means.</description><pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate><category>compliance</category><category>bsi</category><category>tr-02102</category><category>post-quantum</category><category>germany</category><category>compliance</category><author>QuickZTNA Engineering</author></item><item><title>DORA Compliance for Financial Entities: Network Resilience in 10 Steps</title><link>https://quickztna.com/blog/dora-compliance-network-resilience/</link><guid isPermaLink="true">https://quickztna.com/blog/dora-compliance-network-resilience/</guid><description>DORA has applied to EU financial entities since January 2025. Articles 5 through 27 translated into ten concrete network-resilience implementation steps.</description><pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate><category>compliance</category><category>dora</category><category>financial-regulation</category><category>ict-risk-management</category><category>eu-regulation</category><category>regulation-2022-2554</category><author>QuickZTNA Engineering</author></item><item><title>NIS2 Directive Remote Access Requirements: A Builder&apos;s Checklist</title><link>https://quickztna.com/blog/nis2-remote-access-requirements/</link><guid isPermaLink="true">https://quickztna.com/blog/nis2-remote-access-requirements/</guid><description>NIS2 has applied to EU organisations since October 2024. Remote-access-specific reading of Article 21 with a concrete implementation checklist.</description><pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate><category>compliance</category><category>nis2</category><category>eu-cybersecurity</category><category>directive-2022-2555</category><category>remote-access</category><category>compliance</category><author>QuickZTNA Engineering</author></item><item><title>Post-Quantum VPN: 6 Questions to Ask Your Current Vendor</title><link>https://quickztna.com/blog/post-quantum-vpn-vendor-questions/</link><guid isPermaLink="true">https://quickztna.com/blog/post-quantum-vpn-vendor-questions/</guid><description>Most VPN vendors claim post-quantum readiness. Six specific questions separate real implementations from marketing — with honest answers from 2026.</description><pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>post-quantum-vpn</category><category>quantum-safe</category><category>vendor-evaluation</category><category>ztna</category><category>wireguard</category><author>QuickZTNA Engineering</author></item><item><title>NSA CNSA 2.0: Every Deadline DoD Contractors Need to Know</title><link>https://quickztna.com/blog/cnsa-2-0-deadlines/</link><guid isPermaLink="true">https://quickztna.com/blog/cnsa-2-0-deadlines/</guid><description>CNSA 2.0 is the NSA&apos;s post-quantum algorithm suite for US National Security Systems. Approved algorithms, transition deadlines, and what DoD vendors must do.</description><pubDate>Sat, 25 Apr 2026 00:00:00 GMT</pubDate><category>compliance</category><category>cnsa-2-0</category><category>nsa</category><category>post-quantum</category><category>dod</category><category>compliance</category><category>nss</category><author>QuickZTNA Engineering</author></item><item><title>Hybrid Key Exchange X25519 + ML-KEM-768: The Complete Guide</title><link>https://quickztna.com/blog/hybrid-key-exchange-x25519-mlkem/</link><guid isPermaLink="true">https://quickztna.com/blog/hybrid-key-exchange-x25519-mlkem/</guid><description>Hybrid post-quantum key exchange combines X25519 with ML-KEM-768 so a session stays secret if either primitive holds. Construction, code, failure modes.</description><pubDate>Sat, 25 Apr 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>hybrid-key-exchange</category><category>x25519</category><category>ml-kem</category><category>post-quantum</category><category>cryptography</category><author>QuickZTNA Engineering</author></item><item><title>Harvest Now, Decrypt Later: Why Your VPN Traffic Is Already Compromised</title><link>https://quickztna.com/blog/harvest-now-decrypt-later/</link><guid isPermaLink="true">https://quickztna.com/blog/harvest-now-decrypt-later/</guid><description>Harvest now, decrypt later is a real attack model. Nation-state actors record encrypted traffic today to decrypt with future quantum computers.</description><pubDate>Fri, 24 Apr 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>harvest-now-decrypt-later</category><category>post-quantum</category><category>threat-model</category><category>quantum-computing</category><category>cryptography</category><author>QuickZTNA Engineering</author></item><item><title>ML-KEM-768 Explained: The Quantum-Safe Algorithm in Every QuickZTNA Tunnel</title><link>https://quickztna.com/blog/ml-kem-768-explained/</link><guid isPermaLink="true">https://quickztna.com/blog/ml-kem-768-explained/</guid><description>ML-KEM-768 is the NIST-standardised post-quantum KEM in every QuickZTNA tunnel. How it works, real benchmarks, and why we pair it with X25519.</description><pubDate>Fri, 24 Apr 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>ml-kem</category><category>post-quantum</category><category>fips-203</category><category>wireguard</category><category>cryptography</category><author>QuickZTNA Engineering</author></item></channel></rss>