8 results · ● Live web index
fortinet.com article

Quantum Computing Security Business Challenges - Fortinet

https://www.fortinet.com/resources/cyberglossary/quantum-computing-security

# Quantum Computing Security. ## Understanding quantum computing risks and how they impact business security. ## How quantum computing poses a threat to business security? Quantum computing advancements pose several cybersecurity risks for industries that heavily rely on encryption for data security. Enterprises are moving to quantum-resistant encryption like CRYSTALS-Kyber, now ML-KEM, a National Institute of Standards and Technology’s (NIST) recommended algorithm, which is adopted for securing data in this era of post-quantum threats. Organizations must adopt a proactive approach by conducting comprehensive quantum computing security audits, identifying vulnerable encryption systems, and transitioning to quantum-safe encryption. Fortinet offers quantum-safe encryption solutions to help businesses transition to quantum-resistant security frameworks. ### What business sizes face risks from cybersecurity quantum computing threats? Any business, regardless of size, that uses encryption for data security, transactions, or communications must transition to quantum-resistant security frameworks to prevent future breaches.

Visit
industrialcyber.co article

ISACA warns that quantum computing poses major cybersecurity risk, as few firms are ready

https://industrialcyber.co/critical-infrastructure/isaca-warns-that-quantum-c…

[Home](https://industrialcyber.co/ "Go to Industrial Cyber.")[Attacks and Vulnerabilities](https://industrialcyber.co/category/threats-attacks/ "Go to the Attacks and Vulnerabilities category archives.")ISACA warns that quantum computing poses major cybersecurity risk, as few firms are ready. Clyde added that “We also need to implement browsers and websites that support new [NIST-approved algorithms](https://industrialcyber.co/critical-infrastructure/wef-recognizes-cybersecurity-challenges-in-quantum-computing-as-nist-debuts-encryption-algorithms/) for post-quantum cryptography. [![Image 63: UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception](blob:http://localhost/ddc88981aacbccbee03d3506e63aebee)](https://industrialcyber.co/nist/nist-develops-trustworthy-ai-in-critical-infrastructure-profile-to-align-risk-resilience-and-infrastructure-security/). [![Image 67: UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception](blob:http://localhost/ddc88981aacbccbee03d3506e63aebee)](https://industrialcyber.co/threat-landscape/cyber-resilience-moves-beyond-incident-response-as-ai-threats-and-third-party-risks-grow/). [![Image 69: UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception](blob:http://localhost/ddc88981aacbccbee03d3506e63aebee)](https://industrialcyber.co/features/industrial-systems-face-structural-gap-as-quantum-risks-drive-urgency-for-crypto-agility-and-post-quantum-readiness/). [![Image 71: UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception](blob:http://localhost/ddc88981aacbccbee03d3506e63aebee)](https://industrialcyber.co/building-management-systems/claroty-says-cea-852-adoption-accelerates-risk-as-building-systems-become-exposed-to-critical-infrastructure-threats/). [![Image 73: UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception](blob:http://localhost/ddc88981aacbccbee03d3506e63aebee)](https://industrialcyber.co/industrial-cyber-attacks/internet-exposed-ics-devices-running-insecure-modbus-leave-critical-infrastructure-open-to-disruption-comparitech-finds/). [![Image 75: UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception](blob:http://localhost/ddc88981aacbccbee03d3506e63aebee)](https://industrialcyber.co/industrial-cyber-attacks/censys-warns-systemic-exposure-of-rockwell-plcs-enable-iran-linked-targeting-of-critical-infrastructure-ot-networks/). [![Image 77: UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception](blob:http://localhost/ddc88981aacbccbee03d3506e63aebee)](https://industrialcyber.co/reports/ccn-reports-cybersecurity-maturity-becoming-prerequisite-in-critical-infrastructure-industrial-supply-chains/).

Visit
safe.security article

What is Quantum Computing in Cybersecurity? - Safe Security

https://safe.security/resources/insights/understanding-quantum-computing-in-c…

[Platform](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/). [Solutions](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Customers](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Partners](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [FAIR](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Why SAFE?](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Resources](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Company](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). 1. [What is Quantum Computing?](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#What-is-Quantum-Computing--0). 1. [Key Differences from Classical Computing](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Key-Differences-from-Classical-Computing-1). 2. [Impact on Computational Speed](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Impact-on-Computational-Speed-2). 2. [Quantum Computing in Cybersecurity](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Quantum-Computing-in-Cybersecurity-3). 1. [Current Use Cases](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Current-Use-Cases-4). 3. [Potential Cybersecurity Risks with Quantum Computing](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Potential-Cybersecurity-Risks-with-Quantum-Computing-5). 4. [Practical Applications for Cybersecurity Professionals](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Practical-Applications-for-Cybersecurity-Professionals-6). 5. [The Future of Quantum Computing in Cybersecurity](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#The-Future-of-Quantum-Computing-in-Cybersecurity-7). 6. [Frequently Asked Questions](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#-------------------Frequently-Asked-Questions-----------------8). At its core, [quantum computing](https://www.ibm.com/think/topics/quantum-computing?utm_medium=website&utm_source=direct&utm_campaign=safe-security) uses the fundamental principles of quantum mechanics—such as qubits, superposition, and entanglement—to process data at significantly faster rates than classical computers for certain types of problems. Quantum Computing](https://safe.security/wp-content/uploads/Traditional-vs.-Quantum-Computing-1024x576.png). However, future large-scale quantum computers could break these encryption standards by leveraging [Shor’s Algorithm](https://www.classiq.io/insights/shors-algorithm-explained?utm_medium=website&utm_source=direct&utm_campaign=safe-security), a quantum algorithm that efficiently factors large prime numbers and computes discrete logarithms, rendering RSA and ECC encryption vulnerable. **Solution:** Quantum-resistant encryption algorithms, such as [lattice-based cryptography](https://www.redhat.com/en/blog/post-quantum-cryptography-lattice-based-cryptography?utm_medium=website&utm_source=direct&utm_campaign=safe-security), are being developed to mitigate this risk. As part of its [Post-Quantum Cryptography (PQC) Standardization Project,](https://csrc.nist.gov/projects/post-quantum-cryptography?utm_medium=website&utm_source=direct&utm_campaign=safe-security) NIST has been evaluating and selecting encryption algorithms designed to withstand attacks from quantum computers.

Visit
kpmg.com article

Quantum is coming — and bringing new cybersecurity threats with it

https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecuri…

* [Preferences](https://kpmg.com/xx/en/account/preference-management.html). * [All Insights](https://kpmg.com/xx/en/our-insights.html). * [AI and Technology](https://kpmg.com/xx/en/our-insights/ai-and-technology.html). * [ESG](https://kpmg.com/xx/en/our-insights/esg.html). * [Operations](https://kpmg.com/xx/en/our-insights/operations.html). * [Risk and Regulation](https://kpmg.com/xx/en/our-insights/risk-and-regulation.html). * [Transformation](https://kpmg.com/xx/en/our-insights/transformation.html). * [Workforce](https://kpmg.com/xx/en/our-insights/workforce.html). Back [Industries](https://kpmg.com/xx/en/what-we-do/industries.html). * [Financial Services](https://kpmg.com/xx/en/what-we-do/industries/financial-services.html). [Services](https://kpmg.com/xx/en/what-we-do/services.html). * [Advisory](https://kpmg.com/xx/en/what-we-do/services/advisory.html). * [AI](https://kpmg.com/xx/en/what-we-do/services/ai.html). * [Audit and Assurance](https://kpmg.com/xx/en/what-we-do/services/audit.html). * [Legal](https://kpmg.com/xx/en/what-we-do/services/legal.html). * [Tax](https://kpmg.com/xx/en/what-we-do/services/tax.html). * [ServiceNow](https://kpmg.com/xx/en/what-we-do/alliances/service-now.html). * [About KPMG](https://kpmg.com/xx/en/about.html). * [Who we are](https://kpmg.com/xx/en/careers/who-we-are.html). * [What we do](https://kpmg.com/xx/en/careers/what-we-do.html). * [](https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html). * [](https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html). * [Preferences](https://kpmg.com/xx/en/account/preference-management.html). * [Preferences](https://kpmg.com/xx/en/account/preference-management.html). * [opens in a new tab](https://www.linkedin.com/shareArticle?mini=true&url=https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html&title=). * [opens in a new tab](http://twitter.com/share?text=&url=https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html). * [opens in a new tab](http://www.facebook.com/sharer.php?u=https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html&p[title]=). [KPMG firms are helping organizations](https://kpmg.com/xx/en/what-we-do/services/advisory/consulting/technology-consulting.html)mitigate quantum risks. ### [Cybersecurity considerations 2024](https://kpmg.com/xx/en/our-insights/ai-and-technology/cybersecurity-considerations-2024.html). [Read more](https://kpmg.com/xx/en/our-insights/ai-and-technology/cybersecurity-considerations-2024.html). [![Image 4](https://assets.kpmg.com/is/image/kpmgcloud/girl-wearing-glasses-holding-tablet-backend:cq5dam-web-1120-684?wid=304&hei=171)](https://kpmg.com/xx/en/our-insights/ai-and-technology/cybersecurity-considerations-2024.html). ### [Cyber Security Services](https://kpmg.com/xx/en/what-we-do/services/advisory/risk-consulting/cyber-security-services.html). [Read more](https://kpmg.com/xx/en/what-we-do/services/advisory/risk-consulting/cyber-security-services.html). [![Image 5](https://assets.kpmg.com/is/image/kpmgcloud/glowing-tent-in-snowy-area-blue-overlay:cq5dam-web-1120-684?wid=304&hei=171)](https://kpmg.com/xx/en/what-we-do/services/advisory/risk-consulting/cyber-security-services.html). ### [KPMG recognized as a Leader in Cybersecurity Consulting Services in Europe](https://kpmg.com/xx/en/our-insights/ai-and-technology/kpmg-recognized-as-a-leader-in-cybersecurity-consulting-services-in-europe.html). [Read more](https://kpmg.com/xx/en/our-insights/ai-and-technology/kpmg-recognized-as-a-leader-in-cybersecurity-consulting-services-in-europe.html). [![Image 6](https://assets.kpmg.com/is/image/kpmgcloud/blue-cuboids-with-pink-lights:cq5dam-web-1120-684?wid=304&hei=171)](https://kpmg.com/xx/en/our-insights/ai-and-technology/kpmg-recognized-as-a-leader-in-cybersecurity-consulting-services-in-europe.html). * [mail](https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html#). * [mail](https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html#). 1 https://home.kpmg/ca/en/home/market-insights/predictions/technology/quantum-computing-will-help-us-solve-our-most-difficult-problems.html. 2 https://kpmg.com/ca/en/home/media/press-releases/2023/05/quantum-computing-is-coming-but-few-are-ready-for-it.html. * [Newsroom](https://kpmg.com/xx/en/media.html). * [Newsroom](https://kpmg.com/xx/en/media.html). * [About Us](https://kpmg.com/xx/en/about.html). * [About Us](https://kpmg.com/xx/en/about.html). * [Privacy](https://kpmg.com/xx/en/misc/privacy.html). * [Help](https://kpmg.com/xx/en/misc/help.html). You can manage your preferences at any time by clicking [manage choices](https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html#).

Visit
researchgate.net research

(PDF) The Impact of Quantum Computing on Cybersecurity

https://www.researchgate.net/publication/379798084_The_Impact_of_Quantum_Comp…

This article explores the emerging trends in cybersecurity in response to the advent of quantum computing, focusing on the development of quantum-safe

Visit
reddit.com article

How do you think quantum computing will affect cybersecurity?

https://www.reddit.com/r/QuantumComputing/comments/1hnjxyy/how_do_you_think_q…

[Skip to main content](https://www.reddit.com/r/QuantumComputing/comments/1hnjxyy/how_do_you_think_quantum_computing_will_affect/#main-content)How do you think quantum computing will affect cybersecurity? Open menu Open navigation[](https://www.reddit.com/)Go to Reddit Home. Get App Get the Reddit app [Log In](https://www.reddit.com/login/)Log in to Reddit. [![Image 1](https://styles.redditmedia.com/t5_2r7m8/styles/communityIcon_8grfd96tuzmc1.jpg?width=96&height=96&frame=1&auto=webp&crop=96%3A96%2Csmart&s=ca65f444e6ba898f66d2a8ba239d3c8ae62cd8be) Go to QuantumComputing](https://www.reddit.com/r/QuantumComputing/). [r/QuantumComputing](https://www.reddit.com/r/QuantumComputing/)•1y ago. [Dependent_Storage184](https://www.reddit.com/user/Dependent_Storage184/). [Question](https://www.reddit.com/r/QuantumComputing/?f=flair_name%3A%22Question%22). By continuing, you agree to our[User Agreement](https://www.redditinc.com/policies/user-agreement)and acknowledge that you understand the[Privacy Policy](https://www.redditinc.com/policies/privacy-policy). [Impact of quantum computing on cybersecurity](https://www.reddit.com/answers/812fdea3-cc2c-4df1-8de2-3016a22a4878/?q=Impact+of+quantum+computing+on+cybersecurity&source=PDP). [Best quantum security companies](https://www.reddit.com/answers/2ab8942e-97de-488f-85a1-3dcdfa46441f/?q=Best+quantum+security+companies&source=PDP). [Post-quantum cryptography companies](https://www.reddit.com/answers/aaba6fe6-e68d-42c1-95ce-5a75aa0aefd4/?q=Post-quantum+cryptography+companies&source=PDP). [Quantum safe encryption methods](https://www.reddit.com/answers/98de7b29-d4af-46a4-814d-1baa226f7e04/?q=Quantum+safe+encryption+methods&source=PDP). [Latest breakthroughs in quantum algorithms](https://www.reddit.com/answers/a2a2f3ff-33b6-422e-a872-a0959b740cba/?q=Latest+breakthroughs+in+quantum+algorithms&source=PDP). * [Reddit reReddit: Top posts of December 27, 2024 * * *](https://www.reddit.com/posts/2024/december-27-1/global/). * [Reddit reReddit: Top posts of December 2024 * * *](https://www.reddit.com/posts/2024/december/global/). * [Reddit reReddit: Top posts of 2024 * * *](https://www.reddit.com/posts/2024/global/). [Reddit Rules](https://www.redditinc.com/policies/content-policy)[Privacy Policy](https://www.reddit.com/policies/privacy-policy)[User Agreement](https://www.redditinc.com/policies/user-agreement)[Your Privacy Choices](https://support.reddithelp.com/hc/articles/43980704794004)[Accessibility](https://support.reddithelp.com/hc/sections/38303584022676-Accessibility)[Reddit, Inc. All rights reserved.](https://redditinc.com/). * [About Reddit](https://www.redditinc.com/). * [Advertise](https://ads.reddit.com/register?utm_source=web3x_consumer&utm_name=left_nav_cta). * [Developer Platform](https://developers.reddit.com/?utm_source=reddit&utm_medium=left_nav_resources). * [Reddit Pro BETA](https://www.reddit.com/reddit-pro?utm_source=reddit&utm_medium=left_nav_resources). * [Help](https://support.reddithelp.com/hc?utm_source=reddit&utm_medium=footer&utm_campaign=evergreen). * [Careers](https://www.redditinc.com/careers). * [Press](https://www.redditinc.com/press). * [Best of Reddit](https://www.reddit.com/posts/2026/global/). * [Reddit Rules](https://www.redditinc.com/policies/content-policy). * [Privacy Policy](https://www.reddit.com/policies/privacy-policy). * [User Agreement](https://www.redditinc.com/policies/user-agreement). * [Your Privacy Choices](https://support.reddithelp.com/hc/articles/43980704794004). * [Accessibility](https://support.reddithelp.com/hc/sections/38303584022676-Accessibility). All rights reserved.](https://redditinc.com/). ![Image 2](https://id.rlcdn.com/472486.gif).

Visit
sciencedirect.com article

The Impact of Quantum Computing on Cybersecurity—Threats ...

https://www.sciencedirect.com/science/article/abs/pii/S0045790625005920

In Table 2, the research questions are systematically formulated by first identifying critical cybersecurity challenges posed by quantum computing (e.g., threats to RSA, ECC, and AES via Shor’s and Grover’s algorithms) and then pairing each question with proposed quantum-resistant solutions (e.g., post-quantum cryptography, QKD, or hybrid systems). ### [Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions](https://www.sciencedirect.com/science/article/pii/S2452414X24000384). ### [Using quantum key distribution for cryptographic purposes: A survey](https://www.sciencedirect.com/science/article/pii/S0304397514006963). ### [Quantum computing research in medical sciences](https://www.sciencedirect.com/science/article/pii/S2352914824001631). ### [Role of quantum computing in shaping the future of 6 G technology](https://www.sciencedirect.com/science/article/pii/S0950584924000594). ### [Distributed quantum computing: A survey](https://www.sciencedirect.com/science/article/pii/S1389128624005048). ### [Unraveling quantum computing system architectures: An extensive survey of cutting-edge paradigms](https://www.sciencedirect.com/science/article/pii/S0950584923002355). ### [Quantum computing: Vision and challenges](https://www.sciencedirect.com/science/article/pii/B9780443290961000088). ### [Quantum decryption using Shor’s algorithm](https://www.sciencedirect.com/science/article/pii/S2214785323038178). ### [Using quantum amplitude amplification in genetic algorithms](https://www.sciencedirect.com/science/article/pii/S0957417422013604). * ### [Classification of security challenges and mitigation approaches in the quantum software engineering](https://www.sciencedirect.com/science/article/pii/S0164121226001172). * ### [Integrating quantum computing with federated learning for enhanced security and privacy in IoT networks](https://www.sciencedirect.com/science/article/pii/S259012302504544X).

Visit
belfercenter.org article

Quantum Computing and Cybersecurity - Belfer Center

https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity

GAO calls on the Department of Homeland Security and Office of Management and Budget to build out initiatives to improve agencies’ capabilities for managing cyber risks.[31](https://live-hksbelfer.pantheonsite.io/publication/quantum-computing-and-cybersecurity#footnote-009) The federal government should invest time and resources into identifying and prioritizing the activities required to improve understanding of vulnerabilities and migrate to quantum-resistant encryption. * [Executive Summary](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#in-this-section-nav-1 "Executive Summary"). * [Risks and Mitigations](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#in-this-section-nav-4 "Risks and Mitigations"). 3. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-3)Predictions about the timescale for quantum technology development vary. 9. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-9)National Academies of Sciences, Engineering, and Medicine, “Quantum Computing: Progress and Prospects,” 2019, [https://doi.org/10.17226/25196](https://doi.org/10.17226/25196). [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-12)Elsa B. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-14)Maria Korolov and Doug Drinkwater, “What Is Quantum Cryptography? [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-17)National Academies of Sciences, Engineering, and Medicine, “Quantum Computing.”. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-19)National Academies of Sciences, Engineering, and Medicine, “Quantum Computing.”. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-23)T. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-31)U. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-33)Kania and Costello, “Quantum Hegemony? [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-36)Homomorphic encryption is a technique that allows for computations to be done on encrypted data, without requiring access to a secret key. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-37)Jonas Zeuner et al., “Experimental Quantum Homomorphic Encryption,” _Npj Quantum Information_ 7, no.

Visit