As 2025 draws to a close, I am incredibly proud of the agility and
innovation demonstrated by the entire Senetas team.
S E N E T A S N E W S L E T T E R
Securing the Digital Frontier, a Year
of Strategic Agility
Securing the Digital Frontier, a Year of Strategic Agility
Andrew Wilson
Chief Executive Officer
As 2025 draws to a close, I am incredibly proud of the agility and
innovation demonstrated by the entire Senetas team. This year, the threat
landscape has only accelerated, demanding that organizations move beyond
perimeter defence to establish deep, uncompromising security from the core network to the tactical edge.
Our strategy in 2025 focused entirely on meeting this challenge: delivering certified, future-proof security solutions that
guarantee mission resilience today.
Key Highlights and Strategic Milestones for 2025:
1. Leadership in Quantum-Ready Defence
The urgency of the Post-Quantum Cryptography (PQC) transition has never been clearer. We positioned Senetas as the leader in crypto-agility, guiding customers with a staged PQC roadmap to counter the immediate risk of “Harvest Now, Decrypt Later” attacks.
PQC Deployment: We expanded our capacity for hybrid PQC, ensuring platforms like the high-speed CN9000 (up to 100Gbps) and the tactical CN7000 series can protect long-term sensitive data without requiring disruptive hardware replacement.
2. New Alliances: Nokia
We announced a strategic technology alliance with Nokia and have successfully validated our high speed encryptors with their secure wide-area networks. This partnership delivers a uniquely trusted solution, certified by global authorities including NATO and FIPS, empowering defense and critical organizations with high-assurance, quantum-safe connectivity and crypto-agility. You can deploy this robust security immediately, guaranteeing protection without sacrificing network performance, throughput, or latency.
3. Extending Security to the Tactical Edge
Our product innovation was centered on providing certified security where it is needed most—in contested environments.
The CN7000 series has been a major focus, delivering military-grade encryption from the cockpit to the battlefield. Built for extremes, these units are securing everything from ship-to-shore naval operations to earth-to-space links, protecting C5ISR data at full line speed with near-zero latency.
4. Unmatched Global Assurance and Reach
Our commitments to data sovereignty and certified assurance remain paramount.
Global Certification: We maintained the highest standards, with our core product lines certified to key global security authorities, including FIPS 140-3, Common Criteria, DoDIN APL, and NATO standards. This unmatched assurance enables trust and deployment worldwide.
Sovereign Commitment: We proudly participated with Team Defence Australia at major global events including IDEX, Sea Air And Space, AUSA, and the Dubai Airshow, reinforcing our commitment to our sovereign Australian heritage and showcasing our security capability on the world stage.
Thales Partnership: Through our strategic 25-year partnership with the Thales Group, we provide assurance to customers across 60 countries. We are proud to leverage Thales’ extensive global footprint and deep domain expertise to deliver sovereign, high-assurance security solutions on a truly international scale.
5. Supporting the Next Generation of Research
The Next Generation Graduates Program, our collaboration with Monash University and CSIRO, is vital to securing the future. We sponsored Honours student Natalie Chan, who led critical research in developing quantum-safe, redactable digital signatures. This work strengthens the C2PA standard, protecting digital provenance and ensuring verifiable digital truth against the threats of quantum computing and advanced AI. This partnership yields invaluable insights that directly inform the creation of our next-generation encryption technologies.
Conclusion
In closing, 2025 was a year where theory met reality, and agility became the ultimate defense mechanism. Our focus moving forward remains clear: to provide the most secure, most adaptable, and most highly certified network security platforms available, ensuring your data is protected now and well into the quantum era.
Thank you to our shareholders, partners, and employees for making this remarkable year possible.
2025: The Year That Was
Julian Fay
Chief Technology Officer
Engineering Reality: A Reflection on 25 Years and
the Quantum Horizon
As we close out another year, the temptation is always to look strictly at the numbers: the deployments made, the certifications won, or the bandwidth secured. But 2024-2025 has felt different. This was the year the theoretical became operational.
I recently presented at AISA CyberCon in Melbourne addressing the topic “May you Live in Interesting Times”. I referenced Mustafa Suleyman’s concept of “The Coming Wave,” noting that while AI is engineering intelligence and synthetic biology is engineering life, quantum computing is “engineering reality”.
As we celebrated Senetas’ 25th anniversary, we were not just looking back at a quarter of a century’s worth of innovation; we are looking at how we secure that new reality.
The Shift From “If” to
“Now”
For years, the industry discussed the “Quantum Threat” as a distant singularity – a Y2K event for the next decade. This year, the narrative shifted. The threat is no longer about when a Cryptographically Relevant Quantum Computer (CRQC) will arrive; it is about the data being stolen today.
We have spent much of this year educating the market on the “Harvest Now, Decrypt Later” (HNDL) attack vector. Bad actors are not waiting for 2030. They are exfiltrating encrypted data such as financial records, healthcare data, and national secrets, and storing it until quantum computing power can unlock it.
When we consider data longevity – where census data, military intelligence, and health records must remain secure for decades or even lifetimes – the quantum threat is already here.
The Shift From “If” to “Now”
For years, the industry discussed the “Quantum Threat” as a distant singularity – a Y2K event for the next decade. This year, the narrative shifted. The threat is no longer about when a Cryptographically Relevant Quantum Computer (CRQC) will arrive; it is about the data being stolen today.
We have spent much of this year educating the market on the “Harvest Now, Decrypt Later” (HNDL) attack vector. Bad actors are not waiting for 2030. They are exfiltrating encrypted data such as financial records, healthcare data, and national secrets, and storing it until quantum computing power can unlock it.
When we consider data longevity – where census data, military intelligence, and health records must remain secure for decades or even lifetimes – the quantum threat is already here.
The Standardization Milestone
This year, the PQC conversation shifted from “when” to “how.” While U.S. and Australian mandates are accelerating quantum readiness, a dangerous gap remains in the private sector—where 41%* of organizations still lack a transition plan. Closing this “Awareness Gap” is now a primary mission for Senetas and our partners.
Why Agility is Now the Ultimate Defense
NIST’s latest white paper makes it clear: crypto-agility is no longer optional. Past transitions took 20 years, but the scale and speed of the post-quantum shift leave no room for hard-wired security that locks in risk.
At Senetas, our FPGA-based architecture is purpose-built for this reality. It allow cryptography to evolve in the field as standards change – eliminating disruptive hardware replacements and ensuring customers are ready for the uncertainties of the quantum era.
The LATICE Framework: A Path Forward
It is easy to be overwhelmed by the complexity of migration. To cut through the noise, the Australian Signals Directorate (ASD) introduced a practical, phased approach called the LATICE Framework. It moves beyond panic and into process:
Locate and Assess
You cannot secure what you cannot see. We must identify where cryptography is used and triage data based on sensitivity and longevity.
Triage and Implement
Prioritizing high-value assets and deploying post-quantum algorithms.
Communicate
Engaging vendors and training staff to build a culture of crypto-agility.
This framework champions crypto-agility. We are moving away from rigid security postures to agile environments where algorithms can be swapped and updated without overhauling infrastructure.
Trusted Data in Motion
Our technology has evolved to meet this moment. From our CN Series High Speed Encryptors operating at 100Gbps to the ruggedized CN7000 series designed for the tactical edge, we have ensured our hardware is not just robust, but “Quantum Ready”, maintaining our hallmark near-zero latency at speed.
We are proud that our solutions now support hybrid encryption, combining classic physics with quantum-resistant algorithms, to provide a bridge to the future. Whether it is protecting critical infrastructure grids, securing financial transactions, or ensuring military command and control, our technology ensures that data in motion remains the first line of defense.
Conclusion: The Time to Act
Waiting for compliance is no longer a strategy; it is a vulnerability.
As we look toward the next 25 years, our promise remains consistent: Building a future we can all trust. The quantum clock is ticking, but with the right partners, the right roadmap, and proven, certified technology, we can turn this risk into our greatest security advantage.
*2025 ISACA Quantum Computing Pulse Poll
Global Reach, Sovereign Strength
A review of Senetas 2025 engagement
Andrea Van Unen-Smith
Chief Marketing Officer
What a year it’s been for Senetas! Our engagement schedule in 2025 reinforced our commitment to providing the most advanced, certified network encryption solutions wherever duty calls. We’re proud of our heritage and honored to have the opportunity to participate with other Australian defense providers on the world stage.
Securing the Global Defense Landscape
This year saw us fully engage across the sea, air, and land domains alongside Team Defence Australia. Our global itinerary spanned three continents, connecting with defense forces and providers at the highest levels:
From Abu Dhabi to Washington D.C. and Dubai, the conversation remains the same: How do we win and secure the digital battlefield? At IDEX, Sea Air and Space,AUSA and Dubai Airshow we joined forces with military and defense primes to address how to move beyond the “What” and focus on the “How”.
In Europe, we were hosted by Global Victoria at VivaTech in Paris, broadening our engagement with international innovation.
The global trade mission efforts were further highlighted by our participation in an Australian naval briefing followed by the IMDEX conference in Singapore.
Our international partnership with Thales brought us across Asia, joining customer and partners events in Indonesia, Thailand, Malaysia, and Singapore, with stopovers in Tokyo.
Joining Thales TCT at CipherSummit in Maryland, USA, our team captured attendees with the presentation Beyond Theory: Real World Encryption for Modern Networks, providing practical use cases to secure government environments.
Engaging with the Security Community
We attended the European Union Cyber Acts conference where industry and academia addressed sweeping mandates like the Cyber Resilience Act (CRA) and the EU Common Criteria Scheme (EUCC). It’s important we are at the forefront of changes that impact our customers in Europe.
Since 2007, Senetas has led quantum-ready security, launching the first commercial quantum-powered encryptor with ID Quantique. As education on PQC becomes vital, CTO Julian Fay presented in London at the International Cyber Expo with a 101 Guide to Quantum Safe Encryption.
In Maryland, our VP Sales Engineering, Americas, Nish Kawale spoke at Defense TechConnect on securing the digital battlefield by protecting the confidentiality, integrity, and availability of mission-critical communications in the post-quantum era.
Local Focus: Building Agile Defence at Home
In our home country of Australia, we deepened our commitment to national security and intelligence sharing by supporting the Australian Information Security Association (AISA) member conferences, joining CyberCon in Canberra, AdeSEC in Adelaide, and PerthSEC in Perth.
We finished the year by presenting at MilCIS in Canberra along with John Karabin from McGrathNicol, where we shared strategies and tactics from the British Royal Navy to parallel into today’s modern warfare.
Key takeaways included:
Rapid Knowledge Sharing
Emphasizing collaboration and speed in disseminating threat intelligence and lessons learned.
Tactical Innovation
Focusing on a creative and agile approach to counter evolving threats.
Adaptive Defence
Building resilience and flexibility in security posture as environments and attack vectors change.
We concluded the year participating in the AusQRC (Quantum-Resistant Cybersecurity) workshop in Australia, hosted by Monash University. Attendees gathered to discuss challenges around industry transition to QRC. The insights shared reinforced the urgency of preparing our digital defenses, highlighting that “Uncertainty is no excuse for inaction!”
Looking Ahead
Our global presence, from the US capital to the largest airshow, confirms that the demand for quantum-ready encryption is universal. We look forward to leveraging the insights and partnerships gained this year to continue supporting global defense and security in the year to come.