Einstein 1921 Portrait

The rate at which quantum computing is hitting the media stream is ever-increasing. This piece is a collection of articles and reports covering various aspects of quantum computing from the lens of cybersecurity and cryptography. Mea Cubitt

US State Department to form cyber bureau | Hackers, often backed by other nation states and their resources, have repeatedly struck US companies this year, with particular concerns about a surge of ransomware attacks. In May, a ransomware attack targeting pipeline operator Colonial Pipeline led to a temporary disruption to the fuel supply on the East Coast.  Source: E&T.   US State Department to form cyber bureau…

The Quantum Blockchain Technologies share price just jumped 25% | In early trading Tuesday morning, the Quantum Blockchain Technologies (LSE: QBT) share price spiked 25% to 2.7p. At the time of writing, the shares are back a bit to 2.5p. But that’s still a gain of 15% on the day so far.  Source: The Motley Fool.   The Quantum Blockchain Technologies share price just jumped 25%…

QuintessenceLabs Raises A$25 million to take Quantum Safe Cybersecurity Worldwide | QuintessenceLabs, a pioneer and leader in quantum cybersecurity solutions, announced today that it has recently raised a A$25 million round of capital funding led by Main Sequence and TELUS Ventures, with participation from Mizuho Financial Group-backed InterValley Ventures and Terry Snow’s Capital Property Group. This investment underscores QuintessenceLabs’ commitment of providing quantum safe crypto solutions and services to support security communities worldwide. Main Sequence is Australia’s deep tech investment fund, founded by Australia’s national science agency, CSIRO. TELUS Ventures is the strategic investment arm of TELUS Corporation and one of Canada’s most active and longest-standing corporate venture capital (CVC) funds.  Source: businesswire.   QuintessenceLabs Raises A$25 million to take Quantum Safe Cybersecurity Worldwide…

QUANTUM COMPUTING WILL BRING ABOUT A TECHNOLOGICAL REVOLUTION IN THE FIELD OF SECURITY AND DEFENSE | Technology is advancing so fast that we seem to be living in a constant digital revolution. However, what has been achieved so far is part of the evolution of binary computing. It is from this moment on, with the introduction of quantum computing, that we can refer to an authentic new technological revolution.  Source: THALES.   QUANTUM COMPUTING WILL BRING ABOUT A TECHNOLOGICAL REVOLUTION IN THE FIELD OF SECURITY AND DEFENSE…

Microsoft Digital Defense Report shares new insights on nation-state attacks | Microsoft is proud to promote Cybersecurity Awareness Month as part of our ongoing commitment to security for all. Year-round, Microsoft tracks nation-state threat activities to help protect organizations and individuals from these advanced persistent actors. We’re constantly improving our capabilities to bring better detections, threat context, and actor knowledge to our customers so they can improve their own defenses. To learn more about how Microsoft responds to nation-state attacks and how to defend your organization, watch the Decoding NOBELIUM docuseries. Hear directly from the frontline defenders who helped protect organizations against the most sophisticated attack in history.  Source: Microsoft.   Microsoft Digital Defense Report shares new insights on nation-state attacks…

Cybersecurity for Quantum Computing | With rising cyberattack frequency and range, Quantum Computing companies, institutions and research groups may become targets of nation state actors, cybercriminals and hacktivists for sabotage, espionage and fiscal motivations as the Quantum computing race intensifies. Quantum applications have expanded into commercial, classical information systems and services approaching the necessity to protect their networks, software, hardware and data from digital attacks. This paper discusses the status quo of quantum computing technologies and the quantum threat associated with it. We proceed to outline threat vectors for quantum computing systems and the respective defensive measures, mitigations and best practices to defend against the rapidly evolving threat landscape. We subsequently propose recommendations on how to proactively reduce the cyberattack surface through threat intelligence and by ensuring security by design of quantum software and hardware components.  Source: arXiv.   Cybersecurity for Quantum Computing…