…What should CISOs be doing to prepare for the risks of quantum computers and to comply with NSM-10 requirements?

…They should start by gaining an understanding of the new algorithm standards, and from there, focus on inventorying the agency’s most important information and assets…

…In as little as a decade, quantum computers will break many of the encryption schemes in use today, such as the popular RSA algorithm that we use for encrypting internet data and for digitally signing transactions…

Editor’s Note: Italicized statements are directly quoted from the source. Content may have been edited for style and clarity. Read the full article at the source by clicking on the text or image.