Page 29 - Cyber Defense Magazine - Global Print Edition 2018
P. 29
Breaches, Defenses,
Countermeasures, Attack
Methodologies
Preparing for a Future with Quantum Computers
by Jane Melia, Vice President of Strategic Business Development, QuintessenceLabs
uantum computing is progressing the sheer speed and power of quantum A Look at Quantum – What’s All
fast. Google and IBM are making will render today’s public-key encryption
notable developments in the standards obsolete. the Fuss About?
Qspace, as are other firms. On the But it’s not all doom and gloom. Quantum There is a growing awareness that
government side, bills recently proposed is also being leveraged to create conventio nal cybersecurity won’t be
in the U.S. House and Senate are stronger cybersecurity solutions that able to stand up to the processing
looking to put more than $1 billion into address the needs of companies today capabilities of quantum computers. The
furthering quantum technology. The and safeguard for a future with quantum current strategies for sharing encryption
age of quantum computing is textbook computers. After all, protecting our most keys rely on methods commonly known
transformative, and it’s worth getting valuable resource -- information -- has as “asymmetric encryption,” involving
excited about. But with that excitement never been more critical. factoring a large multiplication back into
comes a reminder that for cybersecurity, its prime constituents; a problem that
CYBER DEFENSE MAGAZINE – ANNUAL GLOBAL PRINT EDITION 2018 – SPONSORED BY TREND MICRO 29