Quantum Computing Has Arrived—What’s Next for Cybersecurity?
With the introduction of NIST’s new post-quantum cryptography standards, the cybersecurity landscape is preparing for a seismic shift. The latest episode of Dark Reading Confidential, titled “Quantum Has Landed: So Now What?”, delves into the challenges and strategies surrounding quantum computing’s impact on encryption. This episode features insights from cybersecurity experts Matthew McFadden, Vice President of Cyber at GDIT, and Professor Thomas Scanlon from Carnegie Mellon University’s Heinz College.
With the introduction of NIST’s new post-quantum cryptography standards, the cybersecurity landscape is preparing for a seismic shift. The latest episode of Dark Reading Confidential, titled “Quantum Has Landed: So Now What?”, delves into the challenges and strategies surrounding quantum computing’s impact on encryption. This episode features insights from cybersecurity experts Matthew McFadden, Vice President of Cyber at GDIT, and Professor Thomas Scanlon from Carnegie Mellon University’s Heinz College.
While quantum computing’s full capabilities are not yet realized, experts agree that the cybersecurity sector needs to prepare proactively. The U.S. government and NIST have taken steps by introducing post-quantum cryptographic standards, moving beyond just draft guidelines to fully developed standards. This shift provides a blueprint for organizations to begin adapting their cryptographic practices.
To address the threat posed by quantum computing, experts advise a multi-layered approach:
1. Conduct an Inventory of Cryptographic Assets
2. Adopt a Crypto Agility Mindset
Embrace a flexible approach to cryptographic management, allowing for quick adaptation to new standards as quantum capabilities evolve.
3. Invest in Workforce Education and Governance
Cybersecurity teams and broader IT staff must understand quantum threats and the importance of a proactive cryptography strategy. A top-down approach to governance can ensure organization-wide alignment.
4. Use Hybrid Cryptographic Solutions
Many organizations are adopting hybrid approaches that combine traditional and quantum-resistant cryptography, a practical step while quantum technology is still emerging.
5. Implement Contract Language for Quantum Readiness
For those working with vendors or partners, consider incorporating quantum-safe practices and requirements into contracts to ensure third-party resilience against quantum threats.
While fully transitioning to post-quantum cryptography will be challenging, taking steps now will position organizations to adapt smoothly when quantum computing achieves mainstream impact. This shift is more than a technical adjustment—it’s a strategic decision to safeguard data and maintain trust in an increasingly uncertain digital landscape.
As quantum computing inches closer to reality, the question is no longer if organizations should prepare but when they will take action.