Preparing for the Quantum Threat: How to Secure Your Digital Future
Hot Content
Podcast: Journey to Post-Quantum Preparedness
This Month
Quantum computing and post-quantum (PQ) cryptography are reaching a point where the question is no longer “Are quantum computers really coming or is it just science fiction?” but rather “How long do I have to prepare?”. Samantha Mabey, Entrust’s Director of Digital Security Solutions Marketing, interviews Tom Patterson, Quantum Security Lead at Accenture, in this “boots to the ground” podcast episode discussing key steps organizations should be taking to prepare themselves in advance of the quantum threat.?
While quantum cryptography is viewed largely as a nascent technology, passwords have been around for about 60 years, and people have been talking about their demise for the last 20 or so. So why are passwords still here? And are we actually finally on the cusp of moving away from them? Ken Kadet, Entrust’s VP of Public Relations and Communications, interviewed Andrew Shikiar from the FIDO Alliance to get his thoughts on it in the second of our July podcast episodes: Ditch Your Passwords: The FIDO Alliance's Vision for Online Security .
Institute Feature
Video:
What Is Quantum Computing?
While still in their early stages of development, quantum computers are set to change the world with their ability to break the cryptography and encryption we use today. They are approaching the computing power and stability needed to break public-key encryption protocols.
But before you can understand the quantum threat and the need to start preparing as soon possible, you must first wrap your mind around where quantum computing is today. To help explain these core concepts and get you up to speed, we created this “What is Quantum Computing?” explainer video. Watch Video
Video:
Entrust at RSAC 2024: Crypto-Agility
With the foundations built, we also have a video of Samantha Mabey, Entrust’s Director of Digital Security Solutions Marketing, presenting at this year’s RSA Conference about the potential threats that quantum computing brings and how crypto-agility can help. Watch Video
More Institute Insights
领英推荐
Blog Post:
Post-Quantum Is a Global Challenge Requiring a Global Approach
It’s impossible to set a date for when quantum computers will be capable of breaking public key encryption protocols. When that day comes, the algorithms that currently protect sensitive data, applications, and transactions will be vulnerable to brute-force attacks that could succeed in minutes rather than the decades or even centuries it would take a classical computer.
But one thing’s for sure … with today’s “Harvest Now, Decrypt Later” attacks, the post-quantum era has effectively arrived, shifting the focus from the “when” of PQ to the “how” and “what” of PQ preparedness. Knowing what cryptographic assets and algorithms you have –?and where they reside –?is essential for preparing for post-quantum cryptography.
Thankfully, there are governments and organizations creating frameworks, timelines, and standards to help enterprises around the world draft and implement post-quantum cryptography (PQC) migration plans. Samantha Mabey, Entrust’s Director of Digital Security Solutions Marketing, offers her insight into this topic in her recent blog post. Read Blog Post
?
The Stats
The potential size of the quantum technology market by 2040. Source: McKinsey & Company
Number of qubits in Condor, IBM’s superconducting qubit quantum processor based on cross-resonance gate technology. Source: IBM
About the Entrust Cybersecurity Institute
The Entrust Cybersecurity Institute offers insights and education for IT and business leaders charged with protecting and growing their organizations. Learn more at entrust.com/cybersecurity-institute .
Feedback? Talk to us at [email protected] .