- Next-gen Tech
- 2 min read
Nearly two-thirds of organizations consider quantum computing as the most critical cybersecurity threat in 3–5 years
Six in ten ‘early adopters’ of quantum-safe technologies predict that ‘Q-day’, the point at which quantum computers can break current cryptographic algorithms, will arrive within 5-10 years.
A Capgemini Research Institute report published today, ‘Future encrypted: Why post-quantum cryptography tops the new cybersecurity agenda,’ highlights that rapid progress of quantum computing threatens to render current encryption algorithms obsolete. ‘Harvest-now, decrypt-later’ attacks, together with tightening regulations and the evolving technology landscape, have elevated the importance of quantum safety. However, despite increasing awareness within the industry, many organizations still underestimate the risks surrounding quantum computing, which could lead to future data breaches and regulatory penalties.
While current quantum computers cannot break widely used encryption yet, high-risk industries such as defense and banking are leading the adoption of quantum-safe solutions. In contrast, consumer-focused sectors like consumer products and retail sectors are showing less urgency.Post-quantum cryptography migration preferred over other quantum-security solutions
Most organizations surveyed (70%) are protecting their systems against emerging quantum threats by adopting the appropriate mix of post-quantum cryptographic (PQC) algorithms.
They view PQC as the best option to address near-term quantum security risks because it provides a comprehensive approach to securing data. Nearly half of early adopters are already exploring, assessing feasibility, or piloting PQC solutions. For 70% of organizations, regulatory mandates are a key driver behind the shift to PQC.
While the early adopters are working towards quantum safety, a few organizations (30%) are still ignoring the quantum threat. They are struggling to allocate sufficient budget and personnel to cryptographic transition.
Comments
All Comments
By commenting, you agree to the Prohibited Content Policy
PostBy commenting, you agree to the Prohibited Content Policy
Post