Page 29 - Cyber Defense Magazine - Global Print Edition 2018
P. 29

Breaches, Defenses,



        Countermeasures, Attack


        Methodologies






        Preparing for a Future with Quantum Computers


        by Jane Melia, Vice President of Strategic Business Development, QuintessenceLabs




              uantum computing is progressing  the sheer speed and power of quantum   A Look at Quantum – What’s All
              fast. Google and IBM are making  will render today’s public-key encryption
              notable developments in the  standards obsolete.                  the Fuss About?
        Qspace, as are other firms. On the  But it’s not all doom and gloom. Quantum   There is a growing awareness that
        government side, bills recently proposed  is also being leveraged to create   conventio nal cybersecurity won’t be
        in the U.S. House and Senate are  stronger cybersecurity solutions that   able  to  stand  up  to  the  processing
        looking to put more than $1 billion into  address the needs of companies today   capabilities of quantum computers. The
        furthering quantum technology.  The  and safeguard for a future with quantum   current strategies for sharing encryption
        age of quantum computing is textbook  computers. After all, protecting our most   keys rely on methods commonly known
        transformative, and it’s worth getting  valuable resource -- information -- has   as  “asymmetric encryption,” involving
        excited about. But with that excitement  never been more critical.      factoring a large multiplication back into
        comes a reminder that for cybersecurity,                                its prime constituents; a problem that

                                                     CYBER DEFENSE MAGAZINE – ANNUAL GLOBAL PRINT EDITION 2018  – SPONSORED BY TREND MICRO  29
   24   25   26   27   28   29   30   31   32   33   34