• Forget the AI Armageddon

    From Mike Powell@1:2320/107 to All on Fri Mar 27 10:23:12 2026
    Forget the AI Armageddon -- quantum computing is the real threat to digital security

    Date:
    Thu, 26 Mar 2026 15:00:40 +0000

    Description:
    While AI grabs headlines, quantum computing quietly threatens to upend
    digital security foundations.

    OPINION
    By Willie Tejada
    Social Links Navigation GM & SVP at Aviatrix.

    The quantum clock is ticking faster than we think.

    Artificial intelligence dominates headlines as the technology most likely to reshape societyand potentially destabilize it. But while policymakers and security teams debate AI ethics, a potentially more devastating force is advancing in relative silence: quantum computing. Google 's Willow chip, unveiled in late 2024, completed a benchmark calculation in under five
    minutes that would take the world's fastest supercomputer ten septillion
    years. The quantum era is no longer a decade awayit's arriving in stages,
    right now. The concern isnt hypothetical. The accelerating
    convergence of AI, cloud computing , and early-stage quantum capabilities is already reshaping the threat landscape in ways most organizations are unprepared for.

    The result is a growing quantum clock hanging over corporate America, one
    that is ticking down faster than legacy security models can adapt. This means increasing pressure on organizations to implement quantum-safe measures now, not later. Why quantum changes the security equation At its core, the issue
    is encryption . Nearly all modern digital security - everything from financial transactions and healthcare records to government communicationsrelies on cryptographic methods that assume attackers are limited by classical
    computing power.

    Quantum computers, once sufficiently mature, break that assumption entirely. Algorithms that would take todays fastest supercomputers thousands of years
    to crack could, in theory, be solved in minutes.

    What makes this especially urgent is that adversaries aren't waiting for quantum maturity. Nation-state actors are already executing "harvest now, decrypt later" campaignsintercepting and stockpiling encrypted data today, banking on future quantum systems to crack it open.

    Intelligence agencies have warned that sensitive data with a long shelf lifetrade secrets, defense communications, patient recordsmay already be compromised, years before a quantum computer ever touches it. A breached foundation meets a future threat Today's digital infrastructure is already porous. Years of breaches, credential theft, and supply-chain compromises
    mean attackers routinely begin from a position inside the environment.

    When quantum-enabled decryption becomes practical, it won't arrive in a vacuumit will land in an ecosystem already riddled with hidden access paths
    and dormant footholds.

    This risk is amplified by how modern computing actually works. The digital fabric no one fully sees Most organizations are no longer running a single generation of technology. Instead, they operate a complex mix of legacy systems, containerized applications , serverless functions, and increasingly, AI agents that move autonomously across environments.

    These workloads span multiple cloud providers, on-premises infrastructure,
    and hundreds of SaaS platforms stitched together by APIs, identities, and network connections few organizations fully understand.

    This interconnected cloud environment is a constantly shifting web of dependencies, permissions, and data flows.

    Security failures rarely occur because one system is unprotected; they happen at the seams Recent incidents illustrate this: a SaaS integration drift that silently exposed customer data across trust boundaries, or an automation platform vulnerability that gave attackers lateral movement through orchestration workflows.

    These aren't hypothetical. They're the kinds of gaps adversaries exploit
    daily.

    Regulators have taken notice. Frameworks like CISA's Zero Trust Maturity
    Model 2.0 now mandate runtime proof of zero trust enforcement, not just
    policy documentation.

    The EU's DORA and NIS2 directives require segmentation and full-path encryption. These aren't aspirational targetsthey're compliance deadlines
    that most multi-cloud environments aren't prepared to meet. AI accelerates
    the attack surface AI accelerates this fragility. Autonomous AI tools now traverse systems at machine speed, chaining together actions across databases, APIs, and services in seconds.

    A compromised agentwhether through stolen credentials, manipulated prompts,
    or poisoned training datacan escalate privileges and exfiltrate data across cloud boundaries before a human analyst even triages the first alert.

    This is where the industrys traditional mental model breaks down. The
    perimeter is gone, but security hasnt caught up For decades, cybersecurity
    has been organized around the idea of a perimeter: trusted systems on the inside, threats on the outside. But in cloud and multicloud environments,
    that boundary no longer exists.

    Every workload is potentially exposed because the threats live within the network fabric between those workloads. Every connection is a potential
    attack path. Even the infrastructure designed to enforce boundariesVPNs, gateways, edge deviceshas increasingly become a primary target for exploitation.

    In a post-perimeter world, slogans about zero trust are no longer enough. The concept must move from policy statements into enforceable architectureapplied not just at login, but continuously, at the workload level, across every environment. From slogans to enforceable architecture This shift requires two foundational changes.

    First, organizations must gain real visibility into east-west traffic: the lateral movement between workloads that attackers use to escalate privileges and reach high-value assets.

    Most security tooling still focuses on north-south trafficwhat enters and
    exits the environmentwhile missing the internal pathways where breaches actually unfold.

    Second, security intent must be expressed in terms that reflect how modern systems operate. Static controls built around IP addresses and fixed infrastructure fail in environments dominated by ephemeral workloads and dynamic scaling.

    Instead, access decisions must be tied to workload identity, function, and behavior regardless of where that workload happens to run.

    Taken together, these capabilities define what the industry is beginning to call a cloud-native security fabric: a unifying layer that provides
    continuous visibility into east-west traffic, enforces consistent policy
    across every cloud and data center, and constrains lateral movementwithout requiring organizations to rip and replace their existing infrastructure.

    When paired with zero-trust principles applied directly to workloadsnot just usersthis model offers a way to contain breaches even when attackers gain an initial foothold. Preparing for quantum without waiting for it None of this eliminates the quantum threat. But it changes the equation.

    Quantum computing may eventually break todays encryption. Complexity,
    however, is already breaking todays defenses. Organizations that wait for quantum-safe cryptography standards while ignoring architectural weaknesses risk being compromised long before quantum computers reach maturity.

    In August 2024, NIST finalized its first three post-quantum encryption standardsa landmark step. Organizations should absolutely begin planning
    their cryptographic migration. But adopting new algorithms alone is not
    enough. Complexity is already breaking today's defenses.

    Organizations that pursue quantum-safe cryptography while ignoring the architectural weaknesses underneath it are reinforcing the walls of a
    building with a crumbling foundation. The risk isnt suddenits cumulative The real danger isnt an overnight quantum apocalypse. Its a slow-burn
    failurewhere harvested data, unchecked lateral movement, and unmanaged AI systems converge into a security crisis that feels sudden only in hindsight.

    The path forward starts now: audit your encryption posture, map the lateral pathways through your cloud environments, and begin migrating to quantum-safe standards.

    But don't stop at cryptography.

    The organizations that will weather the quantum transition are those building security into the network fabric itselfwhere trust is enforced continuously,
    at the workload level, across every environment.

    Because while AI may change how we work, quantum computing could change
    whether our digital foundations can be trusted at all.

    This article was produced as part of TechRadarPro's
    Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author
    and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

    Link to news story: https://www.techradar.com/pro/forget-the-ai-armageddon-quantum-computing-is-th e-real-threat-to-digital-security

    $$
    --- SBBSecho 3.28-Linux
    * Origin: Capitol City Online (1:2320/107)