{"id":356283,"date":"2025-07-11T00:01:14","date_gmt":"2025-07-10T18:31:14","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=356283"},"modified":"2025-07-11T00:01:14","modified_gmt":"2025-07-10T18:31:14","slug":"nearly-two-thirds-of-organizations-consider-quantum-computing-as-the-most-critical-cybersecurity-threat-in-3-5-years","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/nearly-two-thirds-of-organizations-consider-quantum-computing-as-the-most-critical-cybersecurity-threat-in-3-5-years\/","title":{"rendered":"Nearly two-thirds of organizations consider quantum computing as the most critical cybersecurity threat in 3\u20135 years"},"content":{"rendered":"<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Six in ten \u2018early adopters\u2019 of quantum-safe technologies predict that \u2018Q-day\u2019, the point at which quantum computers can break current cryptographic algorithms, will arrive within 5-10 years<\/strong><\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Paris, July 10, 2025 \u2013<\/strong> A\u00a0Capgemini\u00a0Research Institute report published today,\u00a0\u2018Future encrypted: Why post-quantum cryptography tops the new cybersecurity agenda,\u2019 highlights that rapid progress of quantum computing threatens to render current encryption algorithms obsolete. \u2018Harvest-now, decrypt-later\u2019 attacks, together with tightening regulations and the evolving technology landscape, have elevated the importance of quantum safety.\u00a0However, despite increasing awareness within the industry, many organizations still underestimate the risks surrounding quantum computing, which could lead to future data breaches and regulatory penalties.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">According to the report, around two-thirds (65%) of organizations are concerned about the rise of \u2018harvest-now, decrypt-later\u2019 attacks. One in six early adopters believe that \u2018Q-day\u2019 will be within five years, while around six in ten believe it will arrive within a decade.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">\u201cQuantum readiness isn\u2019t about predicting a date\u2013it\u2019s about managing irreversible risk. Every encrypted asset today could become tomorrow\u2019s breach if organizations delay adopting post-quantum protections. Transitioning early ensures business continuity, regulatory alignment, and long-term trust,\u201d\u00a0said <strong>Marco Pereira, Global Head of Cybersecurity, Cloud Infrastructure Services at Capgemini.<\/strong>\u00a0\u201cQuantum safety is not a discretionary spend but a strategic investment, which can turn a looming risk into a competitive advantage. The organizations that recognize this fact early will best insulate themselves against future cyber-attacks.\u201d<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">While current quantum computers cannot break widely used encryption yet, high-risk industries such as defense and banking are leading the adoption of quantum-safe solutions. In contrast, consumer-focused sectors like consumer products and retail sectors are showing less urgency.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Post-quantum cryptography migration preferred over other quantum-security solutions<\/strong><\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Most organizations surveyed (70%) are protecting their systems against emerging quantum threats by adopting the appropriate mix of post-quantum cryptographic (PQC) algorithms.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">They view PQC as the best option to address near-term quantum security risks because it provides a comprehensive approach to securing data. Nearly half of early adopters are already exploring, assessing feasibility, or piloting PQC solutions. For 70% of organizations, regulatory mandates are a key driver behind the shift to PQC.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">While the early adopters are working towards quantum safety, a few organizations (30%) are still ignoring the quantum threat. They are struggling to allocate sufficient budget and personnel to cryptographic transition.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Six in ten \u2018early adopters\u2019 of quantum-safe technologies predict that \u2018Q-day\u2019, the point at which quantum computers can break current cryptographic algorithms, will arrive within 5-10 years Paris, July 10, 2025 \u2013 A\u00a0Capgemini\u00a0Research Institute report published today,\u00a0\u2018Future encrypted: Why post-quantum cryptography tops the new cybersecurity agenda,\u2019 highlights that rapid progress of quantum computing threatens to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":348456,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":{"0":"post-356283","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/356283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=356283"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/356283\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/348456"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=356283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=356283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=356283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}