
For many, quantum computing is a little like nuclear fusion. Each is at the very furthest reaches of deep tech – and each its its own way will change the fabric of the world when realised.Physicists hope that commercial nuclear reactors could be realised by the early 2040s. But quantum computing could come sooner – far sooner. When it does arrive – and leaders in the space now say it could do by 2029 – quantum computing will represent the most severe of risks to our encryption algorithms. Luckily, experts are already working on establishing standards for post-quantum approaches – now it’s up to business to put them in place. How long do we have to adopt post-quantum encryption? And what are challenges are business leaders up against?In this episode, Rory is joined by Jason Soroko, senior fellow at Sectigo, to unpack the technicalities of post quantum cryptography and what it means for cybersecurity professionals.Read more:Post-quantum cryptography is now top of mind for cybersecurity leadersGet started on post-quantum encryption, organizations warnedGoogle just revised its ‘Q-Day’ timeline: Quantum computers could break existing encryption techniques within three years – and enterprises are nowhere near readyWhat will the Quantum-Safe 360 Alliance mean for your business and its post-quantum security posture?NCSC: Timelines for migration to post-quantum cryptographyNIST: Post-quantum cryptography
Podzilla Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.

How AI code is changing software development

SPECIAL EDITION: Why cyber resilience is business critical

Managing tech costs in a volatile market

April rundown: OpenAI hesitations and Apple's new CEO
Free AI-powered recaps of The ITPro Podcast and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.