Quantum computing: The data security conundrum

One of the biggest challenges of digital technology today is around security systems and data.
While this has proven successful, advancements in quantum computing - which utilises quantum mechanics to solve complex problems faster than conventional computers - could potentially turn data security on its head. IBM, Microsoft and Google have already turned their attention to quantum computing and, as a result, commercially viable quantum computers are not too far from becoming a reality.
Data security needs to be a step ahead, with more advanced cryptographic algorithms that minimise potential risks and ensure the safeguarding of data in a quantum computing world.
Quantum-resistant data security is a concern as current approaches to data protection use algorithms that traditional computing power would take several years to crack.
While quantum computing is widely considered a potential risk for data security, it could potentially also be a part of the solution, as quantum cybersecurity may provide a more robust and compelling opportunity to safeguard critical data.
According to IBM, quantum computing can aid in providing a more robust way to safeguard critical data than current offerings.
In particular, quantum machine learning and quantum random number generation are believed to provide a viable solution to securing data while at the same time wielding the power to detect and deflect quantum-era cyberattacks before they can cause harm.
As encryption is often a key component of data security, adopting quantum-resistant cryptography will be critical to protecting people and adhering to privacy regulations.
As quantum computing is not widely used as yet, it is unlikely that we will be able to harness quantum computing power to develop a quantum-proof approach to data security for a few years.
Thus, before quantum computing becomes widely adopted, most likely as Quantum-Computing-as-a-Service, it is critical to stay a step ahead of the potential threat and develop a quantum-proof solution now, rather than wait for quantum computers to break the current data encryption models.
To prepare for the quantum revolution, companies need to assess their cyber security infrastructure and identify potential vulnerabilities to quantum computing.
Some traditional forms of data security will be made obsolete with the mass rollout of quantum computing it's believed others are capable of withstanding the potential threats of this evolving technology.
Tokenization, which uses randomization to substitute a real value for a token that conceals that value, is believed to be a viable data security option against quantum computing.
This randomization is a powerful data security tool which, unlike key-based encryption that uses mathematical formulae or proofs to ensure the integrity of the algorithm, stores data with random but reversible tokens which cannot be decrypted with a mathematical solution.
Tokenization substitutes the real value with a token consistently across the enterprise which means that data can be joined in a protected state to power AI, ML, data analytics initiatives and other applications that require data from multiple siloes to drive business outcomes.
Already it is believed that threat actors are scraping data, which means they are stealing and holding onto data until quantum computers are more easily available to decrypt it.
Although much is unknown about the impact quantum computing will have, we do know that we cannot wait for it to become commercially available before implementing more stringent security measures to withstand the threat of its computing power.
Investing in data security today is critical to safeguarding data against emerging threats such as those presented by quantum computing.
While quantum computing and data scientists are working to develop solutions that could potentially be quantum-proof, companies stand to benefit from implementing solutions today that are considered secure against threat actors and quantum computing alike as a first step to implementing a multi-layered approach to future-proofing data security.
This is best achieved by partnering with a company, such as Protegrity, which has extensive experience in identifying and classifying sensitive data and safeguarding it with solutions that will stand up against quantum computing to keep data secure today and in the future.


This Cyber News was published on www.itsecurityguru.org. Publication date: Fri, 09 Feb 2024 13:13:04 +0000


Cyber News related to Quantum computing: The data security conundrum

Quantum computing: The data security conundrum - One of the biggest challenges of digital technology today is around security systems and data. While this has proven successful, advancements in quantum computing - which utilises quantum mechanics to solve complex problems faster than conventional ...
8 months ago Itsecurityguru.org
IBM Heron Quantum Chip, Quantum System Two - Next generation quantum processor dubbed 'Heron', and the modular IBM Quantum System Two unveiled by Big Blue. IBM has unveiled two new quantum developments, with a new series of utility-scale processors housed within a modular quantum system. At its ...
11 months ago Silicon.co.uk
Quantum computing will enable a safer, more secure world - Today's media narrative around quantum computing's role in cybersecurity is overwhelmingly negative, because quantum computers will render today's encryption standards redundant, leaving much of our data at risk of being decoded. First, it's ...
10 months ago Cybersecurity-insiders.com
Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
1 month ago Aws.amazon.com
Getting your organisation post-quantum ready - While quantum computing is still very much in its early stages, it's important that companies are already thinking about this evolving technology - and more importantly implementing and stress testing much needed solutions suitable for a post-quantum ...
11 months ago Cybersecurity-insiders.com
It's time to bolster defenses for an AI / Quantum Future - The rapid advances we are seeing in emerging technologies like AI, ML and quantum computing will have a devastating impact on organizations not prepared and who have not considered updating existing modes of asymmetric data encryption. Quantum is ...
8 months ago Cybersecurity-insiders.com
Edge Computing: Data and Connectivity - Edge computing is a distributed computing model that brings processing capabilities closer to the data source, be it IoT devices, sensors, or end-user devices, rather than relying on centralized data centers. By decentralizing data processing, edge ...
10 months ago Feeds.dzone.com
DORA and your quantum-safe cryptography migration - Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. New requirements for financial entities in the EU. DORA lays out a set of requirements across ICT risk management, incident ...
9 months ago Securityintelligence.com
Breakthrough promises secure quantum computing at home - The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough by scientists at Oxford University Physics guaranteeing security and privacy. This advance promises to ...
6 months ago Sciencedaily.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 month ago Aws.amazon.com
Safeguard Your Network in a Post-Quantum World - There is an imminent threat to existing cryptography with the advent of quantum computers. A quantum computer works with qubits, which can exist in multiple states simultaneously, based on the quantum mechanical principle of superposition. Thus, a ...
9 months ago Feedpress.me
Edge Computing: Enhancing Data Processing - Edge computing revolutionizes data processing by bringing computational power closer to where data is generated, enhancing efficiency and responsiveness. Discover how edge computing is reshaping technology and our interactions with it, unlocking a ...
7 months ago Securityzap.com
Post-Quantum Cryptography Alliance Launches to Advance Post-Quantum Cryptography - PRESS RELEASE. SAN FRANCISCO, Feb. 6, 2024 /PRNewswire/ - The Linux Foundation is excited to announce the launch of the Post-Quantum Cryptography Alliance, an open and collaborative initiative to drive the advancement and adoption of post-quantum ...
9 months ago Darkreading.com
Tech Giants Form Post-Quantum Cryptography Alliance - The Linux Foundation today announced the launch of the Post-Quantum Cryptography Alliance, an initiative to advance and drive the adoption of post-quantum cryptography. Founded by AWS, Cisco, IBM, IntellectEU, Nvidia, QuSecure, SandboxAQ, and the ...
9 months ago Securityweek.com
What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future - Cryptography has long been essential in ensuring the protection of data and communication networks. Remaining reliant on outdated cryptographic standards certainly adds to the dangers of compromise. As we usher in an era of cloud-scaling and quantum ...
7 months ago Cyberdefensemagazine.com
How Communications Companies Can Prepare for Q-Day - After a grueling eight years of testing, the National Institute of Standards and Technology (NIST) has finalized the first three algorithms that will form the backbone of the world's strategy to counter the potential threats of quantum ...
1 month ago Darkreading.com
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
4 months ago Helpnetsecurity.com
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
4 months ago Helpnetsecurity.com
Adapting cybersecurity for the quantum computing era - Researchers are exploring promising quantum computing applications across various domains, from cryptography and optimization problems to drug discovery and artificial intelligence. The race to harness the power of quantum bits has sparked a wave of ...
10 months ago Helpnetsecurity.com
Accenture and SandboxAQ Collaborate to Help Organizations Protect Data - PRESS RELEASE. NEW YORK; Jan. 16, 2024 - Accenture and SandboxAQ are partnering to deliver artificial intelligence and quantum computing solutions to help organizations identify and remediate cybersecurity vulnerabilities. According to recent ...
9 months ago Darkreading.com
China plans to take 'hack-proof' quantum satellite technology to new heights - China is planning new, cutting-edge quantum communications satellites. China launched the first dedicated quantum communications satellite, named Micius, in 2016, and has been quietly working on followup missions in the years since. "Low Earth orbit ...
11 months ago Space.com
Why We Need to Cultivate a Confidential Computing Ecosystem - Researchers have been working on solutions for runtime security for years now. Computing data and deriving value from it - while also preserving its privacy - is no small challenge. The industry is tackling runtime security on all fronts - we've seen ...
9 months ago Securityboulevard.com
AI and Quantum Computing Threaten Encryption and Data Security - While only theoretical at this juncture, one of the big concerns about AI, when combined with quantum computing, is that there is a possibility that what is encrypted at present could be decrypted in the future. This is enough of a security concern ...
11 months ago Securityboulevard.com
Creating a New Market for Post-Quantum Cryptography - A day in the busy life of any systems integrator includes many actions that revolve around the lifeblood of its business - its customers. Systems integrators help solve evolving customer business challenges, which in turn adds partner value. It's a ...
10 months ago Securityboulevard.com
The Latest in Cybersecurity: QuSecure's Quantum Computing Based Security for Endpoints - The world of cybersecurity is an ever-changing one, and with it comes new opportunities for attackers searching for vulnerabilities to exploit. In response, QuSecure has launched an endpoint security solution based on quantum computing to help ...
1 year ago Csoonline.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)