<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Why “Harvest Now, Decrypt Later” (HNDL) may not be your main concern in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Why-Harvest-Now-Decrypt-Later-HNDL-may-not-be-your-main-concern/m-p/88114#M7745</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;H3 id="ember52"&gt;Demystifying Post quantum Topics — Part 2&lt;/H3&gt;&lt;P class=""&gt;This is the second article in my series challenging four well-established ideas about how organizations should approach the transition to post-quantum cryptography (PQC).&lt;/P&gt;&lt;P class=""&gt;Each article presents a slightly provocative argument designed to make you, dear reader, &lt;STRONG&gt;rethink your current assumptions.&lt;/STRONG&gt; Constructive disagreement is always welcome.&lt;/P&gt;&lt;P class=""&gt;In &lt;A class="" href="https://www.linkedin.com/pulse/why-organizations-should-stop-worrying-y2q-start-jaime-g%C3%B3mez-garc%C3%ADa-5edyf/" target="_self"&gt;Part 1&lt;/A&gt;, I argued why organizations should focus on compliance to cryptographic standards rather than on &lt;EM&gt;Y2Q&lt;/EM&gt;. Today’s idea is another common headline topic &lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_down:"&gt;👇&lt;/span&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;“Harvest Now, Decrypt Later” (HNDL) may not be your main concern.&lt;/STRONG&gt;&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember57"&gt;The appeal and the limits of HNDL&lt;/H3&gt;&lt;P class=""&gt;HNDL is often presented as &lt;STRONG&gt;the primary quantum threat&lt;/STRONG&gt; to cybersecurity. It’s simple to explain, sounds impactful, and makes for a great conference slide. Some even claim that data-harvesting activities such as BGP hijacks have increased recently, hinting at preparation for future quantum decryption.&lt;/P&gt;&lt;P class=""&gt;But while HNDL is a &lt;STRONG&gt;plausible&lt;/STRONG&gt; attack vector, it’s also a &lt;STRONG&gt;hard and expensive&lt;/STRONG&gt; one to execute. And attackers tend to look for &lt;EM&gt;efficiency&lt;/EM&gt;.&lt;/P&gt;&lt;P class=""&gt;That’s why organisations should start by asking two basic questions for any use case involving data confidentiality:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Is HNDL an effective attack vector for this use case?&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;What would be the impact of a successful HNDL attack?&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember62"&gt;Efficiency and impact: a reality check&lt;/H3&gt;&lt;P class=""&gt;In practice, HNDL is only effective in &lt;STRONG&gt;highly targeted attacks&lt;/STRONG&gt;. Capturing and storing vast amounts of encrypted traffic for a decade or more, hoping to break the thousands or millions of key exchanges within it once a cryptographically relevant quantum computer (CRQC) exists, is extremely costly and uncertain.&lt;/P&gt;&lt;P class=""&gt;Considering cost, complexity, execution time, and probability of success, it’s an &lt;STRONG&gt;incredibly inefficient&lt;/STRONG&gt; attack vector. There are many cheaper and faster alternatives for a well-prepared adversary.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Worth looking at the original article at the image for a reality check.&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;It can be easier&lt;/DIV&gt;&lt;P class=""&gt;The second part of the analysis is &lt;STRONG&gt;impact&lt;/STRONG&gt;. Losing confidentiality of today’s data 10–15 years from now would rarely cause operational damage. Its main consequence would likely be &lt;STRONG&gt;reputational exposure rather than operational disruption&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class=""&gt;For attackers, investing so much effort for such uncertain gain makes sense only for &lt;STRONG&gt;very high-value, long-term intelligence&lt;/STRONG&gt;. In other words, &lt;EM&gt;HNDL is a niche threat&lt;/EM&gt;.&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember69"&gt;A practical example: banking transactions&lt;/H3&gt;&lt;P class=""&gt;Let’s take a typical case—confidentiality protection for a bank’s transactional data transmitted over the Internet.&lt;/P&gt;&lt;P class=""&gt;&lt;span class="lia-unicode-emoji" title=":keycap_1:"&gt;1️⃣&lt;/span&gt; &lt;STRONG&gt;Is HNDL effective here?&lt;/STRONG&gt; An attacker would need to selectively capture relevant transmissions to maximize the signal-to-noise ratio. That requires knowing the endpoints, timing, and structure of the traffic. With that level of insight and the financial resources required, wouldn’t it be easier to &lt;STRONG&gt;bribe an insider&lt;/STRONG&gt; or &lt;STRONG&gt;exploit a vulnerability&lt;/STRONG&gt; that yields results in months instead of decades?&lt;/P&gt;&lt;P class=""&gt;&lt;span class="lia-unicode-emoji" title=":keycap_2:"&gt;2️⃣&lt;/span&gt; &lt;STRONG&gt;What’s the impact?&lt;/STRONG&gt; If some 15-year-old transactional data is leaked in the late 2030s due to cryptography deprecated in the 2020s, the operational impact might be negligible. Only extremely targeted attacks could cause real damage, and such high-value targets are already protected by more than just a TLS or IPsec session.&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember73"&gt;When HNDL does matter&lt;/H3&gt;&lt;P class=""&gt;So, does this mean HNDL isn’t a threat? Of course not. It depends on the &lt;STRONG&gt;use case&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class=""&gt;Sectors such as &lt;STRONG&gt;defence, government, and diplomacy&lt;/STRONG&gt;, where long-term confidentiality is critical, should absolutely consider HNDL in their threat models. But for most organizations, the more pressing concerns lie elsewhere.&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember76"&gt;The bigger threat: Trust Now, Forge Later (TNFL)&lt;/H3&gt;&lt;P class=""&gt;The real quantum danger lies not in &lt;STRONG&gt;decryption&lt;/STRONG&gt;, but in &lt;STRONG&gt;forgery&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class=""&gt;Quantum computers threaten digital signatures and authentication through what is now known as &lt;STRONG&gt;Trust Now, Forge Later (TNFL)&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class=""&gt;We rely on digital signatures to:&lt;/P&gt;&lt;P class=""&gt;• authenticate legal documents,&lt;/P&gt;&lt;P class=""&gt;• verify identities, and&lt;/P&gt;&lt;P class=""&gt;• ensure the trustworthiness of software and firmware in computers, network devices, HSMs, and even cars.&lt;/P&gt;&lt;P class=""&gt;Unlike encrypted data, many of these assets are &lt;STRONG&gt;publicly available&lt;/STRONG&gt;. An attacker needs only one public key to begin. Once that key is broken, they could forge &lt;STRONG&gt;valid signatures&lt;/STRONG&gt; on malicious software, documents, or websites. Even more concerning, &lt;STRONG&gt;breaking a root Certificate Authority (CA) key&lt;/STRONG&gt; would have a &lt;STRONG&gt;catastrophic, Internet-wide impact, &lt;/STRONG&gt;undermining trust across digital ecosystems. Such an event would cause &lt;STRONG&gt;immediate operational disruption&lt;/STRONG&gt; and require &lt;STRONG&gt;emergency responses at scale&lt;/STRONG&gt; to contain the damage.&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember84"&gt;The PQC Marathon: Start with Harvest Now, Decrypt Now (HNDN)&lt;/H3&gt;&lt;P class=""&gt;During the PKI Consortium’s PQC Conference, someone asked me about implementing urgent and complex changes to include PQC in all their TLS connections to “defend against HNDL.”&lt;/P&gt;&lt;P class=""&gt;My answer was simple: &lt;STRONG&gt;It’s more important to eliminate obsolete cryptography, like TLS 1.0, than to rush PQC deployment.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;If HNDL isn’t an efficient attack vector for your environment, it’s not your biggest risk. Using outdated protocols, however, exposes you to a far more realistic threat: &lt;STRONG&gt;Harvest Now, Decrypt Now (HNDN).&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;Transitioning to PQC is a &lt;STRONG&gt;marathon&lt;/STRONG&gt; that no organization has ever run before. If you were training for a marathon, you would:&lt;/P&gt;&lt;P class=""&gt;🏃&lt;span class="lia-unicode-emoji" title=":male_sign:"&gt;♂️&lt;/span&gt; &lt;STRONG&gt;Start slow&lt;/STRONG&gt; — building endurance (your &lt;EM&gt;maturity phase&lt;/EM&gt;, improving cryptography management).&lt;/P&gt;&lt;P class=""&gt;&lt;span class="lia-unicode-emoji" title=":clipboard:"&gt;📋&lt;/span&gt; &lt;STRONG&gt;Plan your pacing&lt;/STRONG&gt; — setting milestones and split times (your &lt;EM&gt;planning phase&lt;/EM&gt;, analyzing use cases and priorities).&lt;/P&gt;&lt;P class=""&gt;&lt;span class="lia-unicode-emoji" title=":chequered_flag:"&gt;🏁&lt;/span&gt; &lt;STRONG&gt;Run your race&lt;/STRONG&gt; — executing the plan, maintaining rhythm and focus (your &lt;EM&gt;execution phase&lt;/EM&gt;).&lt;/P&gt;&lt;P class=""&gt;The same principle applies to PQC: &lt;STRONG&gt;Don’t sprint at the start of the marathon chasing a risk that isn’t relevant to you.&lt;/STRONG&gt; Your goal isn’t just to implement PQC: it’s to &lt;STRONG&gt;eliminate quantum-vulnerable cryptography.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;Start today by improving your cryptography management and retiring obsolete algorithms and protocols. Addressing &lt;STRONG&gt;&lt;EM&gt;Harvest Now, Decrypt Now&lt;/EM&gt;&lt;/STRONG&gt; risks, the product of cryptographic technical debt, is a &lt;STRONG&gt;current, tangible threat&lt;/STRONG&gt; and a &lt;STRONG&gt;no-regret action&lt;/STRONG&gt; that strengthens your security posture immediately. The knowledge you gain in this initial phase will help you &lt;STRONG&gt;assess and prioritize&lt;/STRONG&gt; your next steps: building a long-term, sustainable plan.&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember94"&gt;In Summary&lt;/H3&gt;&lt;P class=""&gt;Analyze your threat model to understand where your real risks lie. Attack vectors stemming from &lt;STRONG&gt;cryptographic technical debt&lt;/STRONG&gt; and &lt;STRONG&gt;immature management&lt;/STRONG&gt; (HNDN) may be more relevant in the short term, and offer excellent opportunities to begin your transition.&lt;/P&gt;&lt;P class=""&gt;In most cases, &lt;STRONG&gt;TNFL&lt;/STRONG&gt; may also be more relevant than &lt;STRONG&gt;HNDL&lt;/STRONG&gt;. Don’t rely on buzzwords or sales pitches. Make your own informed assessment.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Source:&amp;nbsp;&amp;nbsp;&lt;A href="https://www.linkedin.com/pulse/why-harvest-now-decrypt-later-hndl-may-your-main-jaime-g%C3%B3mez-garc%C3%ADa-c9bnf/" target="_blank" rel="noopener"&gt;https://www.linkedin.com/pulse/why-harvest-now-decrypt-later-hndl-may-your-main-jaime-g%C3%B3mez-garc%C3%ADa-c9bnf/&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Regards&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Tue, 17 Feb 2026 21:00:22 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2026-02-17T21:00:22Z</dc:date>
    <item>
      <title>Why “Harvest Now, Decrypt Later” (HNDL) may not be your main concern</title>
      <link>https://community.isc2.org/t5/Industry-News/Why-Harvest-Now-Decrypt-Later-HNDL-may-not-be-your-main-concern/m-p/88114#M7745</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;H3 id="ember52"&gt;Demystifying Post quantum Topics — Part 2&lt;/H3&gt;&lt;P class=""&gt;This is the second article in my series challenging four well-established ideas about how organizations should approach the transition to post-quantum cryptography (PQC).&lt;/P&gt;&lt;P class=""&gt;Each article presents a slightly provocative argument designed to make you, dear reader, &lt;STRONG&gt;rethink your current assumptions.&lt;/STRONG&gt; Constructive disagreement is always welcome.&lt;/P&gt;&lt;P class=""&gt;In &lt;A class="" href="https://www.linkedin.com/pulse/why-organizations-should-stop-worrying-y2q-start-jaime-g%C3%B3mez-garc%C3%ADa-5edyf/" target="_self"&gt;Part 1&lt;/A&gt;, I argued why organizations should focus on compliance to cryptographic standards rather than on &lt;EM&gt;Y2Q&lt;/EM&gt;. Today’s idea is another common headline topic &lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_down:"&gt;👇&lt;/span&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;“Harvest Now, Decrypt Later” (HNDL) may not be your main concern.&lt;/STRONG&gt;&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember57"&gt;The appeal and the limits of HNDL&lt;/H3&gt;&lt;P class=""&gt;HNDL is often presented as &lt;STRONG&gt;the primary quantum threat&lt;/STRONG&gt; to cybersecurity. It’s simple to explain, sounds impactful, and makes for a great conference slide. Some even claim that data-harvesting activities such as BGP hijacks have increased recently, hinting at preparation for future quantum decryption.&lt;/P&gt;&lt;P class=""&gt;But while HNDL is a &lt;STRONG&gt;plausible&lt;/STRONG&gt; attack vector, it’s also a &lt;STRONG&gt;hard and expensive&lt;/STRONG&gt; one to execute. And attackers tend to look for &lt;EM&gt;efficiency&lt;/EM&gt;.&lt;/P&gt;&lt;P class=""&gt;That’s why organisations should start by asking two basic questions for any use case involving data confidentiality:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Is HNDL an effective attack vector for this use case?&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;What would be the impact of a successful HNDL attack?&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember62"&gt;Efficiency and impact: a reality check&lt;/H3&gt;&lt;P class=""&gt;In practice, HNDL is only effective in &lt;STRONG&gt;highly targeted attacks&lt;/STRONG&gt;. Capturing and storing vast amounts of encrypted traffic for a decade or more, hoping to break the thousands or millions of key exchanges within it once a cryptographically relevant quantum computer (CRQC) exists, is extremely costly and uncertain.&lt;/P&gt;&lt;P class=""&gt;Considering cost, complexity, execution time, and probability of success, it’s an &lt;STRONG&gt;incredibly inefficient&lt;/STRONG&gt; attack vector. There are many cheaper and faster alternatives for a well-prepared adversary.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Worth looking at the original article at the image for a reality check.&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;It can be easier&lt;/DIV&gt;&lt;P class=""&gt;The second part of the analysis is &lt;STRONG&gt;impact&lt;/STRONG&gt;. Losing confidentiality of today’s data 10–15 years from now would rarely cause operational damage. Its main consequence would likely be &lt;STRONG&gt;reputational exposure rather than operational disruption&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class=""&gt;For attackers, investing so much effort for such uncertain gain makes sense only for &lt;STRONG&gt;very high-value, long-term intelligence&lt;/STRONG&gt;. In other words, &lt;EM&gt;HNDL is a niche threat&lt;/EM&gt;.&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember69"&gt;A practical example: banking transactions&lt;/H3&gt;&lt;P class=""&gt;Let’s take a typical case—confidentiality protection for a bank’s transactional data transmitted over the Internet.&lt;/P&gt;&lt;P class=""&gt;&lt;span class="lia-unicode-emoji" title=":keycap_1:"&gt;1️⃣&lt;/span&gt; &lt;STRONG&gt;Is HNDL effective here?&lt;/STRONG&gt; An attacker would need to selectively capture relevant transmissions to maximize the signal-to-noise ratio. That requires knowing the endpoints, timing, and structure of the traffic. With that level of insight and the financial resources required, wouldn’t it be easier to &lt;STRONG&gt;bribe an insider&lt;/STRONG&gt; or &lt;STRONG&gt;exploit a vulnerability&lt;/STRONG&gt; that yields results in months instead of decades?&lt;/P&gt;&lt;P class=""&gt;&lt;span class="lia-unicode-emoji" title=":keycap_2:"&gt;2️⃣&lt;/span&gt; &lt;STRONG&gt;What’s the impact?&lt;/STRONG&gt; If some 15-year-old transactional data is leaked in the late 2030s due to cryptography deprecated in the 2020s, the operational impact might be negligible. Only extremely targeted attacks could cause real damage, and such high-value targets are already protected by more than just a TLS or IPsec session.&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember73"&gt;When HNDL does matter&lt;/H3&gt;&lt;P class=""&gt;So, does this mean HNDL isn’t a threat? Of course not. It depends on the &lt;STRONG&gt;use case&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class=""&gt;Sectors such as &lt;STRONG&gt;defence, government, and diplomacy&lt;/STRONG&gt;, where long-term confidentiality is critical, should absolutely consider HNDL in their threat models. But for most organizations, the more pressing concerns lie elsewhere.&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember76"&gt;The bigger threat: Trust Now, Forge Later (TNFL)&lt;/H3&gt;&lt;P class=""&gt;The real quantum danger lies not in &lt;STRONG&gt;decryption&lt;/STRONG&gt;, but in &lt;STRONG&gt;forgery&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class=""&gt;Quantum computers threaten digital signatures and authentication through what is now known as &lt;STRONG&gt;Trust Now, Forge Later (TNFL)&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class=""&gt;We rely on digital signatures to:&lt;/P&gt;&lt;P class=""&gt;• authenticate legal documents,&lt;/P&gt;&lt;P class=""&gt;• verify identities, and&lt;/P&gt;&lt;P class=""&gt;• ensure the trustworthiness of software and firmware in computers, network devices, HSMs, and even cars.&lt;/P&gt;&lt;P class=""&gt;Unlike encrypted data, many of these assets are &lt;STRONG&gt;publicly available&lt;/STRONG&gt;. An attacker needs only one public key to begin. Once that key is broken, they could forge &lt;STRONG&gt;valid signatures&lt;/STRONG&gt; on malicious software, documents, or websites. Even more concerning, &lt;STRONG&gt;breaking a root Certificate Authority (CA) key&lt;/STRONG&gt; would have a &lt;STRONG&gt;catastrophic, Internet-wide impact, &lt;/STRONG&gt;undermining trust across digital ecosystems. Such an event would cause &lt;STRONG&gt;immediate operational disruption&lt;/STRONG&gt; and require &lt;STRONG&gt;emergency responses at scale&lt;/STRONG&gt; to contain the damage.&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember84"&gt;The PQC Marathon: Start with Harvest Now, Decrypt Now (HNDN)&lt;/H3&gt;&lt;P class=""&gt;During the PKI Consortium’s PQC Conference, someone asked me about implementing urgent and complex changes to include PQC in all their TLS connections to “defend against HNDL.”&lt;/P&gt;&lt;P class=""&gt;My answer was simple: &lt;STRONG&gt;It’s more important to eliminate obsolete cryptography, like TLS 1.0, than to rush PQC deployment.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;If HNDL isn’t an efficient attack vector for your environment, it’s not your biggest risk. Using outdated protocols, however, exposes you to a far more realistic threat: &lt;STRONG&gt;Harvest Now, Decrypt Now (HNDN).&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;Transitioning to PQC is a &lt;STRONG&gt;marathon&lt;/STRONG&gt; that no organization has ever run before. If you were training for a marathon, you would:&lt;/P&gt;&lt;P class=""&gt;🏃&lt;span class="lia-unicode-emoji" title=":male_sign:"&gt;♂️&lt;/span&gt; &lt;STRONG&gt;Start slow&lt;/STRONG&gt; — building endurance (your &lt;EM&gt;maturity phase&lt;/EM&gt;, improving cryptography management).&lt;/P&gt;&lt;P class=""&gt;&lt;span class="lia-unicode-emoji" title=":clipboard:"&gt;📋&lt;/span&gt; &lt;STRONG&gt;Plan your pacing&lt;/STRONG&gt; — setting milestones and split times (your &lt;EM&gt;planning phase&lt;/EM&gt;, analyzing use cases and priorities).&lt;/P&gt;&lt;P class=""&gt;&lt;span class="lia-unicode-emoji" title=":chequered_flag:"&gt;🏁&lt;/span&gt; &lt;STRONG&gt;Run your race&lt;/STRONG&gt; — executing the plan, maintaining rhythm and focus (your &lt;EM&gt;execution phase&lt;/EM&gt;).&lt;/P&gt;&lt;P class=""&gt;The same principle applies to PQC: &lt;STRONG&gt;Don’t sprint at the start of the marathon chasing a risk that isn’t relevant to you.&lt;/STRONG&gt; Your goal isn’t just to implement PQC: it’s to &lt;STRONG&gt;eliminate quantum-vulnerable cryptography.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;Start today by improving your cryptography management and retiring obsolete algorithms and protocols. Addressing &lt;STRONG&gt;&lt;EM&gt;Harvest Now, Decrypt Now&lt;/EM&gt;&lt;/STRONG&gt; risks, the product of cryptographic technical debt, is a &lt;STRONG&gt;current, tangible threat&lt;/STRONG&gt; and a &lt;STRONG&gt;no-regret action&lt;/STRONG&gt; that strengthens your security posture immediately. The knowledge you gain in this initial phase will help you &lt;STRONG&gt;assess and prioritize&lt;/STRONG&gt; your next steps: building a long-term, sustainable plan.&lt;/P&gt;&lt;HR /&gt;&lt;H3 id="ember94"&gt;In Summary&lt;/H3&gt;&lt;P class=""&gt;Analyze your threat model to understand where your real risks lie. Attack vectors stemming from &lt;STRONG&gt;cryptographic technical debt&lt;/STRONG&gt; and &lt;STRONG&gt;immature management&lt;/STRONG&gt; (HNDN) may be more relevant in the short term, and offer excellent opportunities to begin your transition.&lt;/P&gt;&lt;P class=""&gt;In most cases, &lt;STRONG&gt;TNFL&lt;/STRONG&gt; may also be more relevant than &lt;STRONG&gt;HNDL&lt;/STRONG&gt;. Don’t rely on buzzwords or sales pitches. Make your own informed assessment.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Source:&amp;nbsp;&amp;nbsp;&lt;A href="https://www.linkedin.com/pulse/why-harvest-now-decrypt-later-hndl-may-your-main-jaime-g%C3%B3mez-garc%C3%ADa-c9bnf/" target="_blank" rel="noopener"&gt;https://www.linkedin.com/pulse/why-harvest-now-decrypt-later-hndl-may-your-main-jaime-g%C3%B3mez-garc%C3%ADa-c9bnf/&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Regards&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 21:00:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Why-Harvest-Now-Decrypt-Later-HNDL-may-not-be-your-main-concern/m-p/88114#M7745</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2026-02-17T21:00:22Z</dc:date>
    </item>
  </channel>
</rss>

