top of page

The transition to post-quantum cryptography represents one of the most significant security shifts of the decade.



To address this challenge, OpenText has released Fortify SAST & DAST 25.4, introducing new capabilities that help organizations identify vulnerabilities and prepare for the impact of quantum computing.


Quantum Threat: A Real and Immediate Challenge

The algorithms that currently protect our digital information — RSA, DSA, and ECC — will become vulnerable under the power of quantum computers. The “harvest now, decrypt later” risk is already in motion: sensitive data can be collected today and decrypted in the future, compromising intellectual property, contracts, financial transactions, and strategic information.



The Global Movement

Progress in this field is both rapid and inevitable:

  • The NIST (USA) published the official post-quantum cryptography standards (FIPS 203, 204, and 205) in 2024.

  • Over 47% of HTTPS traffic already uses hybrid post-quantum protocols.

  • Platforms such as Java 24 and .NET 10 have introduced native support.

  • Governments have set mandatory targets by 2030 for critical sectors.


OpenText Fortify SAST & DAST 25.4: Innovation for a Secure Future


The latest version of Fortify enables security and development teams to anticipate quantum impact:

  • SAST 25.4 automatically detects quantum-vulnerable algorithms (RSA, DSA).

  • DAST 25.4 identifies servers lacking post-quantum hybrid TLS 1.3 support, including X25519MLKEM768.

  • Flexibility: findings can be presented as Informational or with severity levels adjusted to the organization’s maturity.


Strategic Value for Management

  • Creation of a comprehensive inventory of cryptography in use.

  • Robust validation of critical communications.

  • Regulatory readiness and preparation for future audits.

  • Strengthening of digital resilience and market trust.


Cybersafe supports organizations in their transition to a post-quantum future, combining technical expertise, innovation, and industry-leading cybersecurity solutions.



Contact us to learn how to strengthen your organization’s security and digital resilience.



In today’s world, work increasingly happens in the browser: SaaS applications, web platforms, remote collaboration, BYOD (Bring Your Own Device)… And if the browser becomes a critical point of risk, it can also become the most effective line of defense.


Prisma Browser by Palo Alto Networks is here to redefine enterprise security, turning the browser into the first shield of digital protection.
With this solution, organizations can empower their teams to work from anywhere, on any device, with the confidence that corporate data is protected, without relying on VPNs or corporate-managed devices.


Key features include:

  • Security policies applied directly in the browser, even on personal or unmanaged devices.

  • Native integration with the SASE (Secure Access Service Edge) architecture, ensuring consistent protection in any environment.

  • Prevention of sophisticated threats such as phishing, malware, data exfiltration, and uncontrolled use of GenAI applications.

  • Granular visibility and control, allowing organizations to see who accesses what, from which device — without the need to manage the entire endpoint.


Benefits for organizations:

  • Reduced risk in BYOD environments, protecting unmanaged devices.

  • Simplified security architecture, with less reliance on VPNs and complex infrastructures.

  • Improved user experience, maintaining the familiarity and fluidity of the browser.

  • Security built for the hybrid and distributed work era.


Prisma Browser represents a new paradigm: security that follows the user, wherever they are.



Talk to Cybersafe to learn more about Prisma Browser and discover how to turn your browser into your company’s first line of defense.


CyberSafe launches the ROC, based on the Qualys Enterprise TruRisk™ Management (ETM) platform, with the goal of transforming the way organizations approach cybersecurity.


In an increasingly complex business landscape - with hybrid infrastructures, cloud, IoT, and remote teams - companies face a growing volume of vulnerabilities and alerts. The challenge is no longer the lack of data, but rather giving that data context and prioritization.


The ROC emerges as an integrated approach that consolidates and correlates data from multiple sources, contextualizes risks based on financial impact and real-time threat intelligence, and automates responses to reduce exposure time. The solution translates technical metrics into strategic indicators, facilitating communication between security teams and executive management.


With the ROC, organizations shift from a reactive to a proactive risk management posture, gaining full visibility, operational efficiency, and greater responsiveness to critical threats.

In an environment where the pace of threats shows no signs of slowing, the ROC represents a decisive step toward making cybersecurity a strategic function, one capable of protecting the business, optimizing resources, and strengthening the trust of customers and stakeholders.


If you would like to learn more about the Qualys ROC, please contact us.

bottom of page