Timeline to Implement Post-Quantum Cybersecurity
Recently, QuSecure VP, Customer Success Kosta Vilk discussed the timeline to implement post-quantum cybersecurity. Can we afford to wait? Is this something we should be doing now? Here is what Kosta had to say:
“Many of our customers, especially those who are really on the cutting edge of technology, are already performing safety checkups on their systems. They are trying to stay ahead, ahead of the game, ahead of the competition, and ahead of the attackers. They are already implementing quantum systems themselves.”
Understanding the timeline for necessary post-quantum cybersecurity is essential for ensuring the company’s safety. QuSecure has been working with several large enterprise clients in financial services, healthcare, government sectors, and critical infrastructure. Vilk said, “they recognize the need. They have been putting budgets together to study the need, understand and figure out how they will take these post-quantum technologies to market to protect themselves. They typically see it as a huge motivator for their PR value in thought-leadership. Still, they’re now starting to see it as a fiduciary responsibility, specifically around how to protect customers, assets, and intellectual property?”
These enterprises, sectors, and infrastructures should consider the timeline in which they need to employ quantum-safe solutions and choose a strategy to implement new cryptography gradually. This preparation, in some cases, could take up to five to ten years to complete the transition. In terms of practice, multiple offerings are available that use public-key encryption (PKI) and incorporate one of NIST’s (National Institute of Standards and Technology) finalist algorithms (i.e., Mars, RC6, Rijndael, Serpent, and Twofish). One of these will soon become a benchmark for protection against quantum attacks.
#technology, #cybersecurity, #cyberdefense #ciso, #quantumcomputing, #cyberattacks, #quantum, #cto, #cisos, #technologynews, #quantumtechnology, #quantumphysics, #cybersecuritythreats, #ctos, #quantumtechnologies, #cyberresiliency, #quantumtech, #quantumsecurity, #quantumcommunication, #quantumsoftware, #quantumiscoming