Get all your news in one place.
100’s of premium titles.
One app.
Start reading
Top News
Top News

Experts Share Crucial Steps to Defend Against Quantum Computing Threats

Fortify data security strategies to withstand challenges from AI and quantum computing.

In today's digital age, data security has become a paramount concern for organizations around the world. With the rapid advancements in artificial intelligence (AI) and the emergence of quantum computing, it is crucial for leaders to fortify their data protection strategies to withstand the challenges that lie ahead. To help you navigate this ever-evolving landscape, we have compiled valuable insights from experts in the cybersecurity field.

Thomas Kranz, an esteemed consultant, highlights the importance of focusing on how data is accessed rather than solely relying on encryption solutions. While encryption is crucial, issues such as phishing, insecure credentials, and poor security hygiene still plague organizations and undermine existing encryption measures. One suggested approach is to manually enter a key during firewall setup, using human behavior as a secret factor that powerful computers cannot guess.

Alon Bender, an expert in the field, further emphasizes the significance of governance and controls as additional layers of security. He suggests leveraging the time-lapse of keystrokes by a human entering a random string to create a pairing encryption key that remains unguessable by quantum computing.

Having a robust data loss prevention (DLP) program is another crucial step in safeguarding sensitive data. Mani Padisetti, CEO of Digital Armour, underscores the importance of DLP in identifying, monitoring, and protecting valuable information. This not only ensures data integrity and confidentiality but also inspires trust and confidence in your organization's security practices.

Lila Kee, Chief Product Officer at GlobalSign, directs organizations to prepare for AI and quantum computing threats by identifying internal champions who can assess the organization's critical and riskiest data. Evaluating encryption and obfuscation practices becomes imperative to mitigate the potential risks posed by technological advancements.

Kiran Palla, from the Department of Treasury, raises concerns about the vulnerabilities of asymmetric encryption methods used in RSA, ECC, and DH. While quantum computing poses a high risk to RSA security, resolving this issue before its maturity is crucial. Discourses surrounding these potential threats should receive greater attention.

Patrick Walsh, CEO of IronCore Labs, points out that quantum computers will not break all aspects of security and cryptography. Instead, public key algorithms will be the main casualty. He suggests organizations shift towards crypto-agile solutions that allow for the evolution of cryptographic methods over time without requiring extensive development projects. New solutions, such as encrypting AI's memory through vector embeddings, offer promising avenues for securing AI systems.

Investing in the development and implementation of post-quantum cryptography algorithms is advocated by Amitkumar Shrivastava, Chief Technology Officer at Fujitsu. These cryptographic methods are devised to withstand both classical and quantum computers, providing a robust defense against potential threats. Encouraging education and fostering public-private partnerships will facilitate the rapid adoption of these methods, strengthening our data security infrastructure.

Eric Cole, founder of Secure Anchor Consulting, reminds us that key management is often the weakest link in data security. Many organizations still utilize static keys stored alongside the data, posing significant vulnerabilities. Key management must be the primary focus to ensure a robust security framework.

Denis Mandich, CEO of Qrypt, advises organizations to assign a knowledgeable person or team to stay up to date with the advancements in quantum computing or consider partnering with specialized firms. The transition from classical to post-quantum cryptography will necessitate long and complex processes, but it is crucial for the digital economy. Investing in systems that can be upgraded to new NIST standards by 2024 is vital to avoid obsolescence.

Peter Gregory, CEO of GCI Communications, emphasizes the importance of cataloging all the encryption used within an organization. Assessing each solution's ability to swap algorithms and pressuring vendors to develop flexibility in their systems is crucial. Visibility and agility are key to managing cryptosystems in a modern enterprise, as you cannot manage systems that you are unaware of or lack flexibility.

Elliott Wilkes, CEO of Advanced Cyber Defence Systems, acknowledges that while the advent of quantum computing and AI poses significant threats, organizations must not overlook existing vulnerabilities. Ransomware attacks and financial crime groups often exploit well-documented vulnerabilities, such as outdated cryptography. Regularly reviewing your IT and OT footprint, along with auditing systems for configuration vulnerabilities, is imperative for data protection.

Ronald Martey, an expert from the GCB Bank, stresses the importance of collaboration between security researchers and various industries. Standardizing efforts and influencing the development of quantum-safe protocols and standards will help to avoid a 'Q-Day' when quantum computers render current encryption methods obsolete.

In conclusion, as the world becomes increasingly connected and technologically advanced, organizations must prioritize data security in the face of AI and quantum computing. By following the advice of these experts, you can fortify your defenses and navigate the complexities of this evolving landscape. Stay informed, remain vigilant, and invest in the necessary measures to ensure the sanctity and confidentiality of your valuable data.

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.