Thales and Quantinuum Offer a Trusted Foundation to Help Organizations Begin Creating Quantum Resilience Today

Thales and Quantinuum Offer a Trusted Foundation to Help Organizations Begin Creating Quantum Resilience Today
divya
Tue, 02/14/2023 – 06:04

To safeguard their users and infrastructure from sophisticated and ever-evolving cybersecurity threats, businesses of all sizes and across all sectors rely on robust encryption solutions that reduce these attack vectors. The advent of quantum computing will pave the way for many exciting new developments, but it also poses an unprecedented risk to data security and privacy and security teams must begin building appropriate resilience today to protect their business from a rapidly approaching threat.

Cybersecurity for a post-quantum era

The impact of a breach of sensitive health, financial and operational data will substantially increase due to the approaching quantum threat, whereby digital document integrity and security will be questioned. This risk is intensified by the fact that bad actors are acquiring and storing encrypted data today in anticipation of the day when quantum computing will render most current popular public key encryption schemes obsolete. Given the sensitive nature of the underlying data, this “harvest now, decrypt later” cyber-attack vector is a rapidly growing security concern for many firms. A recent Deloitte poll found that just over half of the security professionals surveyed believed that their organization was at risk of this type of attack, but only 27% of organizations had completed a relevant risk assessment.

In fact, governments and corporations have started making active plans to implement cybersecurity measures for a post-quantum world in reaction to this new and real danger. The US government’s announcement that all Federal agencies must have conducted and submitted an assessment of cryptographically vulnerable systems by 4th May 2023 is one of many examples where governments are pushing to build resilience. A quantum-secure security posture requires a h

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Thales CPL Blog Feed

Read the original article: