Forget the AI Armageddon -- quantum computing is the real threat to digital security
Date:
Thu, 26 Mar 2026 15:00:40 +0000
Description:
While AI grabs headlines, quantum computing quietly threatens to upend
digital security foundations.
OPINION
By Willie Tejada
Social Links Navigation GM & SVP at Aviatrix.
The quantum clock is ticking faster than we think.
Artificial intelligence dominates headlines as the technology most likely to reshape societyand potentially destabilize it. But while policymakers and security teams debate AI ethics, a potentially more devastating force is advancing in relative silence: quantum computing. Google 's Willow chip, unveiled in late 2024, completed a benchmark calculation in under five
minutes that would take the world's fastest supercomputer ten septillion
years. The quantum era is no longer a decade awayit's arriving in stages,
right now. The concern isnt hypothetical. The accelerating
convergence of AI, cloud computing , and early-stage quantum capabilities is already reshaping the threat landscape in ways most organizations are unprepared for.
The result is a growing quantum clock hanging over corporate America, one
that is ticking down faster than legacy security models can adapt. This means increasing pressure on organizations to implement quantum-safe measures now, not later. Why quantum changes the security equation At its core, the issue
is encryption . Nearly all modern digital security - everything from financial transactions and healthcare records to government communicationsrelies on cryptographic methods that assume attackers are limited by classical
computing power.
Quantum computers, once sufficiently mature, break that assumption entirely. Algorithms that would take todays fastest supercomputers thousands of years
to crack could, in theory, be solved in minutes.
What makes this especially urgent is that adversaries aren't waiting for quantum maturity. Nation-state actors are already executing "harvest now, decrypt later" campaignsintercepting and stockpiling encrypted data today, banking on future quantum systems to crack it open.
Intelligence agencies have warned that sensitive data with a long shelf lifetrade secrets, defense communications, patient recordsmay already be compromised, years before a quantum computer ever touches it. A breached foundation meets a future threat Today's digital infrastructure is already porous. Years of breaches, credential theft, and supply-chain compromises
mean attackers routinely begin from a position inside the environment.
When quantum-enabled decryption becomes practical, it won't arrive in a vacuumit will land in an ecosystem already riddled with hidden access paths
and dormant footholds.
This risk is amplified by how modern computing actually works. The digital fabric no one fully sees Most organizations are no longer running a single generation of technology. Instead, they operate a complex mix of legacy systems, containerized applications , serverless functions, and increasingly, AI agents that move autonomously across environments.
These workloads span multiple cloud providers, on-premises infrastructure,
and hundreds of SaaS platforms stitched together by APIs, identities, and network connections few organizations fully understand.
This interconnected cloud environment is a constantly shifting web of dependencies, permissions, and data flows.
Security failures rarely occur because one system is unprotected; they happen at the seams Recent incidents illustrate this: a SaaS integration drift that silently exposed customer data across trust boundaries, or an automation platform vulnerability that gave attackers lateral movement through orchestration workflows.
These aren't hypothetical. They're the kinds of gaps adversaries exploit
daily.
Regulators have taken notice. Frameworks like CISA's Zero Trust Maturity
Model 2.0 now mandate runtime proof of zero trust enforcement, not just
policy documentation.
The EU's DORA and NIS2 directives require segmentation and full-path encryption. These aren't aspirational targetsthey're compliance deadlines
that most multi-cloud environments aren't prepared to meet. AI accelerates
the attack surface AI accelerates this fragility. Autonomous AI tools now traverse systems at machine speed, chaining together actions across databases, APIs, and services in seconds.
A compromised agentwhether through stolen credentials, manipulated prompts,
or poisoned training datacan escalate privileges and exfiltrate data across cloud boundaries before a human analyst even triages the first alert.
This is where the industrys traditional mental model breaks down. The
perimeter is gone, but security hasnt caught up For decades, cybersecurity
has been organized around the idea of a perimeter: trusted systems on the inside, threats on the outside. But in cloud and multicloud environments,
that boundary no longer exists.
Every workload is potentially exposed because the threats live within the network fabric between those workloads. Every connection is a potential
attack path. Even the infrastructure designed to enforce boundariesVPNs, gateways, edge deviceshas increasingly become a primary target for exploitation.
In a post-perimeter world, slogans about zero trust are no longer enough. The concept must move from policy statements into enforceable architectureapplied not just at login, but continuously, at the workload level, across every environment. From slogans to enforceable architecture This shift requires two foundational changes.
First, organizations must gain real visibility into east-west traffic: the lateral movement between workloads that attackers use to escalate privileges and reach high-value assets.
Most security tooling still focuses on north-south trafficwhat enters and
exits the environmentwhile missing the internal pathways where breaches actually unfold.
Second, security intent must be expressed in terms that reflect how modern systems operate. Static controls built around IP addresses and fixed infrastructure fail in environments dominated by ephemeral workloads and dynamic scaling.
Instead, access decisions must be tied to workload identity, function, and behavior regardless of where that workload happens to run.
Taken together, these capabilities define what the industry is beginning to call a cloud-native security fabric: a unifying layer that provides
continuous visibility into east-west traffic, enforces consistent policy
across every cloud and data center, and constrains lateral movementwithout requiring organizations to rip and replace their existing infrastructure.
When paired with zero-trust principles applied directly to workloadsnot just usersthis model offers a way to contain breaches even when attackers gain an initial foothold. Preparing for quantum without waiting for it None of this eliminates the quantum threat. But it changes the equation.
Quantum computing may eventually break todays encryption. Complexity,
however, is already breaking todays defenses. Organizations that wait for quantum-safe cryptography standards while ignoring architectural weaknesses risk being compromised long before quantum computers reach maturity.
In August 2024, NIST finalized its first three post-quantum encryption standardsa landmark step. Organizations should absolutely begin planning
their cryptographic migration. But adopting new algorithms alone is not
enough. Complexity is already breaking today's defenses.
Organizations that pursue quantum-safe cryptography while ignoring the architectural weaknesses underneath it are reinforcing the walls of a
building with a crumbling foundation. The risk isnt suddenits cumulative The real danger isnt an overnight quantum apocalypse. Its a slow-burn
failurewhere harvested data, unchecked lateral movement, and unmanaged AI systems converge into a security crisis that feels sudden only in hindsight.
The path forward starts now: audit your encryption posture, map the lateral pathways through your cloud environments, and begin migrating to quantum-safe standards.
But don't stop at cryptography.
The organizations that will weather the quantum transition are those building security into the network fabric itselfwhere trust is enforced continuously,
at the workload level, across every environment.
Because while AI may change how we work, quantum computing could change
whether our digital foundations can be trusted at all.
This article was produced as part of TechRadarPro's
Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author
and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here:
https://www.techradar.com/news/submit-your-story-to-techradar-pro
Link to news story:
https://www.techradar.com/pro/forget-the-ai-armageddon-quantum-computing-is-th e-real-threat-to-digital-security
$$
--- SBBSecho 3.28-Linux
* Origin: Capitol City Online (1:2320/107)