Why Companies Trust Hardware-Based Security Over Quantum Computing
Check out all the Smart Security Summit on-demand sessions here.
Designing zero-trust in silicon and producing hardware-based security at the chip level is delivering on the promises made by quantum computing years ago.
But basic quantum computing-based technologies (quantum bits or qubits) are too noisy to provide telemetry data including endpoint detection and response (EDR) and extended detection and response ( XDR) need to operate at scale in an enterprise. . Even with cybersecurity vendors exploring quantum computing to capture and interpret weak signals, the technology remains impractical for common cybersecurity use today.
Quantum computing needs a cybersecurity use caseIf quantum computing is to help solve cybersecurity challenges, it must increase stability, speed, and scale in identifying weak signals and stopping breaches while providing real-time data from powerful algorithms. A recent Financial Times article, “The Hype Around Quantum Computing Recoils from Lack of Practical Uses,” criticizes claims by Chinese researchers that it defeated RSA encryption using quantum computers, a technological achievement that is expected to take a decade or more.
>>Don't miss our special issue: The CIO Agenda: The 2023 Roadmap for CIOs.
Check out all the Smart Security Summit on-demand sessions here.
Designing zero-trust in silicon and producing hardware-based security at the chip level is delivering on the promises made by quantum computing years ago.
But basic quantum computing-based technologies (quantum bits or qubits) are too noisy to provide telemetry data including endpoint detection and response (EDR) and extended detection and response ( XDR) need to operate at scale in an enterprise. . Even with cybersecurity vendors exploring quantum computing to capture and interpret weak signals, the technology remains impractical for common cybersecurity use today.
Quantum computing needs a cybersecurity use caseIf quantum computing is to help solve cybersecurity challenges, it must increase stability, speed, and scale in identifying weak signals and stopping breaches while providing real-time data from powerful algorithms. A recent Financial Times article, “The Hype Around Quantum Computing Recoils from Lack of Practical Uses,” criticizes claims by Chinese researchers that it defeated RSA encryption using quantum computers, a technological achievement that is expected to take a decade or more.
>>Don't miss our special issue: The CIO Agenda: The 2023 Roadmap for CIOs.
What's Your Reaction?