Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Quantum Attack Protection Added to HP Business PCs

An upgraded ESC security chip makes the firmware of several HP business PCs resilient to quantum computer attacks.

Quantum computing certificate risks

HP announced on Thursday that several of its business PCs now benefit from protection against quantum computer attacks thanks to a new security chip.

The tech giant said the 5th generation of its Endpoint Security Controller (ESC) chip, which is built into some of its computers, can protect the integrity of the device’s firmware using quantum-resistant cryptography. 

According to HP, the 5th generation ESC is currently available in Zbool Firefly, Power and Studio workstations; EliteBook 1000 series, 800 series and some 600 series notebooks; and some 400 series ProBook notebooks.

“By embedding protection against quantum computer hacks at the chip level, HP is today setting a new standard in hardware and firmware security with our 5th generation ESC chip,” HP said. “By isolating the chip from the processor and OS, the ESC provides a hardware platform that reduces the risk of data breaches and improves productivity by preventing downtime.”

[ Read: Cyber Insights 2024: Quantum and the Cryptopocalypse ]

While practical quantum computer attacks may still be at least a decade away, major tech companies have already started taking steps to ensure that the cryptography used in their products will be able to provide protection against quantum attacks when that day comes.

Apple, for instance, recently announced adding post-quantum encryption to iMessage to protect communications against quantum computing attacks.

Governments have also started taking steps to tackle the theoretical threats posed by quantum computing before they become a reality. 

Advertisement. Scroll to continue reading.

HP urges businesses to immediately start planning for the future and begin migrating their fleets. The company recommends identifying the highest priority use cases, finding out what technology providers are planning in regards to quantum protections, and creating a plan to ensure protection is rolled out in the required timeframe. 

Related: AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithm

Related: In Other News: WEF’s Unsurprising Cybersecurity Findings, KyberSlash Cryptography Flaw

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Data Protection

By implementing strong security practices,, organizations can significantly reduce the risks associated with lost and stolen computers and safeguard their sensitive information.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.

Endpoint Security

When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own...