• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Endpoint Security

Zoom Workplace now includes post-quantum end-to-end encryption

FutureCISO Editors by FutureCISO Editors
June 10, 2024
Photo by Matilda Wormwood: https://www.pexels.com/photo/woman-in-blue-denim-jacket-using-macbook-pro-4099099/

Photo by Matilda Wormwood: https://www.pexels.com/photo/woman-in-blue-denim-jacket-using-macbook-pro-4099099/

Share on FacebookShare on Twitter

Zoom Video Communications, Inc. announced the global availability of post-quantum end-to-end encryption (E2EE) for Zoom Workplace, specifically Zoom Meetings, making it the first unified communications-as-a-service company to offer a post-quantum E2EE solution for video conferencing. 

Michael Adams

Michael Adams, Zoom's chief information security officer, said, "With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data. At Zoom, we continuously adapt as the security threat landscape evolves, with the goal of keeping our users protected."

Post-quantum E2E encryption

To prevent the "harvest now, decrypt later" scenario to capture encrypted traffic in the present, intending to decrypt it in the future when quantum computers have become more advanced, Zoom's offering uses public key cryptography to mitigate potential future threats.

The participants' machines, not servers from Zoom, generate the keys for each Zoom meeting. Zoom explained on its website, "Encrypted data relayed through Zoom's servers is indecipherable by Zoom since Zoom's servers do not have the necessary decryption key. This key management strategy is similar to most E2EE messaging platforms today."

Limited functionality

Zoom further explained that E2EE can enhance privacy and data protection and serve as an additional layer of risk mitigation and protection of sensitive meeting content.

However, enabling Zoom's E2EE in meetings turns off features such as joining before the host, cloud recording, Zoom Whiteboard, AI Companion features, streaming, live transcription, and polling.

"Individual Zoom users should determine whether they need these features before enabling E2EE in their meetings," Zoom explained in the article.

Related:  PodChats for FutureCISO: Narrowing the cybersecurity gender leadership gap
Tags: cybersecurityquantum safetyZoomZoom Video Communications
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • DDoS attacks surge in Asia Pacific, claims Cloudflare
  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl