小程序
传感搜
传感圈

3 Ways to Prepare Your Business for the Inevitable Quantum Revolution

2022-08-24
关注

Technology has continually evolved rapidly to meet business needs. However, the rapid pace of evolution often leaves companies dealing with new risks, some of which they fail to anticipate. Quantum computing is the next technological frontier offering immense potential and risks.

McKinsey and Company believe that the value at stake for quantum computing use cases is worth over $80 billion. The size of the industry could surpass that within the next few years. However, quantum computing is incompatible with current cybersecurity postures.

Quantum tech processes information differently from today's computers. These processes can handle more data and deliver insights at blazing speed. As a result, companies must upgrade their infrastructure and the security processes guarding them.

Here are three ways enterprises can execute right now to prepare for the quantum future.

Related: Cybersecurity Is No Longer An Option. Your Money Is in Immediate Danger.

Explore process flexibility

Quantum computing's power comes from its building block: a Qubit. Traditional computers process information in binary code, a string of zeros and ones, to decode and create output. Quantum computers ditch binary strings for the much more volatile Qubit, a string of information that allows the processor to explore several paths to a solution. In addition, the Qubit frees the computer to deal with several inputs at once.

The upshot of this fundamental change is that the current security infrastructure will soon become outdated. Most organizations currently use a hybrid of cloud and on-premise apps to enforce security. However, these solutions move at speed limited by hardware. They process information at an infinitesimally slow pace compared to the rates at which quantum processors move.

An attack on a system executed by a quantum computer will likely cripple most hardware infrastructure. Solutions providers are currently grappling with this issue by upgrading their technology and installing quantum tech.

However, given quantum technology's nascent condition, experts struggle to predict the final form a solution will take. Enterprises must begin rethinking the flexibility in their infrastructure since they'll have to adapt to new conditions quickly once quantum computing fully arrives.

Aside from researching the threats quantum computing poses, companies must also rethink their security models. For instance, most systems are secured by passwords backed by 2FA authentication. Password or key-centric access is vulnerable to quantum computing power despite multiple security layers.

Currently, secret vaults store keys and assign new ones based on a processor's ability to break them. As a result, most keys to securing company secrets are tricky for existing processors but a cakewalk for quantum processors.

Implementing password-less access via FIDO protocols is a possible solution. Keeping up to date with NIST's recommendations is another option companies should explore.

Related: Quantum Computing Threatens Everything — Could it be Worse Than the Apocalypse?

Invest in talent

Cybersecurity is challenging, and companies are hard-pressed to find the right talent. Most developers lack a security background, choosing to specialize in application development aligned with agile practices. As a result, security talent is short.

The arrival of quantum computing adds another layer to the challenge. Quantity computing talent is low, and quantum security talent is challenging to find. One solution for enterprises is to invest in educating existing talent and upskilling employees.

Offering grants and other incentives to rising talent is another way for companies to adopt a robust stance. Companies following this path have the chance to pioneer the field of quantum cybersecurity, something that will stand them in good stead in the future.

Aside from developing talent pipelines, companies must also use analytics to plug holes in their security postures. Using what-if scenarios, corporations can create a risk matrix that identifies potential breaches if a quantum threat ever occurs. For instance, they can identify which systems are most at risk and which data will likely suffer an impact.

Analytics cannot fully comprehend the speed of quantum processors currently. However, by modeling extreme scenarios on these platforms, companies can check the impact on their processes and create recovery plans.

Recognize the opportunity

Quantum computers' abilities currently fall short of traditional computing power. However, the technology has an immense runway. Transitioning to a fully quantum model will take time, and companies must begin preparing immediately.

Much like how VR and AI technologies suffered phases of low interest, quantum computing will experience periods where investment and enthusiasm will diminish. However, companies must not mistake this natural phenomenon as an excuse to stop preparing for a quantum future.

Despite the so-called AI winter, AI is present in almost every platform and process in several industries. Similarly, quantum computing is bound to make its way into several applications. To successfully transition, companies must evaluate their business goals and define the scope of their adoption projects.

For instance, algorithms that are currently too sophisticated to execute via traditional computing must be defined and stored safely. Their infrastructure needs must be specified. Most importantly, the security processes they will need must be identified. Working backward from these needs, companies can identify the steps they must take to get there.

Preparation is the key because when quantum computing fully arrives, those left behind will find it tough to make up lost ground.

A promising future

Quantum computing is set to relegate current technology to the level of the abacus. While the technology still has a ways to go before it is used widely, there's undoubtedly colossal potential. Only time will tell what the future will look like. However, enterprises must seize the opportunity to secure their risks and map development plans to match quantum needs right now.

Related: What Small Businesses Need to Know About the Future of Cybersecurity and Hackers

参考译文
3种方法为不可避免的量子革命做好准备
技术不断地快速发展以满足业务需求。然而,快速发展的步伐往往会让企业面临新的风险,其中一些风险是它们未能预料到的。量子计算是下一个具有巨大潜力和风险的技术前沿。麦肯锡公司认为,量子计算用例的价值超过800亿美元。该行业的规模可能在未来几年内超过这一数字。然而,量子计算与目前的网络安全态势是不兼容的。量子技术处理信息的方式与今天的计算机不同。这些流程可以处理更多的数据,并以惊人的速度提供见解。因此,公司必须升级其基础设施和保护它们的安全流程。以下是企业可以立即执行的三种方法,为量子未来做准备。相关:网络安全不再是一个选择。你的钱正处于紧急危险之中。量子计算的能力来自它的构建块:一个量子比特。传统计算机以二进制代码(一串0和1)处理信息,以解码和生成输出。量子计算机抛弃二进制字符串,转而使用更不稳定的量子比特(Qubit),这是一串信息,可以让处理器探索多条路径来获得解决方案。此外,量子比特使计算机可以同时处理多个输入。这种根本变化的结果是,当前的安全基础设施将很快过时。大多数组织目前都混合使用云和内部应用程序来加强安全性。然而,这些解决方案的速度受到硬件的限制。它们处理信息的速度比量子处理器的速度慢得多。由量子计算机执行的对系统的攻击可能会削弱大多数硬件基础设施。解决方案提供商目前正在通过升级技术和安装量子技术来解决这个问题。然而,考虑到量子技术的新生状况,专家很难预测解决方案的最终形式。企业必须开始重新考虑其基础设施的灵活性,因为一旦量子计算全面到来,它们将不得不迅速适应新的条件。除了研究量子计算带来的威胁,公司还必须重新考虑他们的安全模型。例如,大多数系统都由2FA身份验证支持的密码保护。尽管有多个安全层,但以密码或密钥为中心的访问仍然容易受到量子计算能力的攻击。目前,秘密库存储密钥并根据处理器破解密钥的能力分配新的密钥。因此,保护公司机密的大多数密钥对现有处理器来说是棘手的,但对量子处理器来说是小菜一碟。通过FIDO协议实现无密码访问是一个可能的解决方案。跟上NIST'的建议是公司应该探索的另一个选择。相关文章:量子计算威胁一切——它会比世界末日更糟糕吗?网络安全是具有挑战性的,公司很难找到合适的人才。大多数开发人员缺乏安全背景,选择专门从事与敏捷实践一致的应用程序开发。因此,保安人才短缺。量子计算的到来又增加了一层挑战。数量计算人才很低,而量子安全人才很难找到。企业的一个解决方案是投资培养现有人才和提高员工技能。为不断壮大的人才提供资助和其他激励措施,是企业采取强硬立场的另一种方式。遵循这条道路的公司有机会成为量子网络安全领域的先驱,这将使他们在未来受益。 除了发展人才储备,公司还必须利用分析来填补安全漏洞。利用假设场景,企业可以创建一个风险矩阵,在量子威胁发生时识别潜在的入侵。例如,它们可以识别出哪些系统风险最大,哪些数据可能会受到影响。目前,分析还不能完全理解量子处理器的速度。然而,通过在这些平台上对极端情况进行建模,公司可以检查对流程的影响,并创建恢复计划。量子计算机# 39;目前的计算能力低于传统的计算能力。然而,这项技术还有广阔的跑道。向完全量子模型过渡需要时间,企业必须立即开始准备。就像VR和AI技术遭遇低兴趣阶段一样,量子计算也将经历投资和热情下降的时期。然而,公司绝不能把这种自然现象当作停止为量子未来做准备的借口。尽管有所谓的AI冬天,但AI几乎存在于多个行业的每个平台和流程中。类似地,量子计算注定会有多种应用。为了成功地过渡,公司必须评估他们的业务目标,并定义他们采用项目的范围。例如,当前过于复杂而不能通过传统计算执行的算法必须安全定义和存储。必须指定它们的基础设施需求。最重要的是,必须确定它们所需的安全流程。从这些需求出发,企业可以确定实现目标所必须采取的步骤。准备工作是关键,因为当量子计算全面到来时,那些落后的国家将发现很难收复失地。量子计算将使目前的技术降至算盘的水平。虽然这项技术在被广泛使用之前还有很长的路要走,但毫无疑问它有巨大的潜力。只有时间才能告诉我们未来会是什么样子。然而,企业必须抓住机遇,确保自己的风险,并规划发展计划,以匹配量子现在的需求。相关文章:关于网络安全和黑客的未来,小企业需要知道什么
  • en
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

提取码
复制提取码
点击跳转至百度网盘