CISA Urges Organizations to Take Security Measures for Quantum Computers

Share post:

The Cybersecurity and Infrastructure Security Agency (CISA) has called on organizations to prepare for the new era, in particular the introduction of security measures for quantum computers.

The agency called on technology leaders to prepare for migration to stronger security systems, explore risk mitigation methods and help develop new standards.

Quantum computing is the future, and while organizations are already implementing various structures to make it realistic and accessible, it is also important that this technology tool is supported with the highest level of security to prevent it from being exploited by attackers.

Although research on quantum-secure encryption algorithms is still ongoing, CISA advises organizations to follow the “post-quantum cryptography roadmap,” which includes the need for CEOs to step up their engagement with organizations working on post-quantum standards.

Organizations must also keep an inventory of the most sensitive and critical data sets that need to be safeguarded over a longer period of time.

Organizations must conduct an inventory of all systems that use cryptographic technology for each function, as this will help to facilitate a smooth transition in the future.

Cybersecurity officials within organizations should identify acquisition, cybersecurity, and data security standards that need to be updated to meet quantum-building requirements.

Organizations must identify where and for what purpose public key cryptography is being used and mark those systems as quantum vulnerable.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Microsoft’s AI success may spell defeat for it’s climate goals

Microsoft's ambitious strides in AI technology are now posing a significant challenge to its own climate goals, as...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways