BBS:      TELESC.NET.BR
Assunto:  Forget the AI Armageddon
De:       Mike Powell
Data:     Fri, 27 Mar 2026 10:23:12 -0500
-----------------------------------------------------------
Forget the AI Armageddon -- quantum computing is the real threat to digital
security

Date:
Thu, 26 Mar 2026 15:00:40 +0000

Description:
While AI grabs headlines, quantum computing quietly threatens to upend 
digital security foundations.

OPINION
By Willie Tejada
Social Links Navigation GM & SVP at Aviatrix.

The quantum clock is ticking faster than we think.

Artificial intelligence dominates headlines as the technology most likely to
reshape societyand potentially destabilize it. But while policymakers and
security teams debate AI ethics, a potentially more devastating force is
advancing in relative silence: quantum computing. Google 's Willow chip,
unveiled in late 2024, completed a benchmark calculation in under five 
minutes that would take the world's fastest supercomputer ten septillion
years. The quantum era is no longer a decade awayit's arriving in stages,
right now.  The concern isnt hypothetical. The accelerating
convergence of AI, cloud computing , and early-stage quantum capabilities is
already reshaping the threat landscape in ways most organizations are
unprepared for. 

The result is a growing quantum clock hanging over corporate America, one 
that is ticking down faster than legacy security models can adapt. This means
increasing pressure on organizations to implement quantum-safe measures now,
not later. Why quantum changes the security equation At its core, the issue 
is encryption . Nearly all modern digital security - everything from financial
transactions and healthcare records to government communicationsrelies on
cryptographic methods that assume attackers are limited by classical 
computing power. 

Quantum computers, once sufficiently mature, break that assumption entirely.
Algorithms that would take todays fastest supercomputers thousands of years 
to crack could, in theory, be solved in minutes.

What makes this especially urgent is that adversaries aren't waiting for
quantum maturity. Nation-state actors are already executing "harvest now,
decrypt later" campaignsintercepting and stockpiling encrypted data today,
banking on future quantum systems to crack it open. 

Intelligence agencies have warned that sensitive data with a long shelf
lifetrade secrets, defense communications, patient recordsmay already be
compromised, years before a quantum computer ever touches it. A breached
foundation meets a future threat Today's digital infrastructure is already
porous. Years of breaches, credential theft, and supply-chain compromises 
mean attackers routinely begin from a position inside the environment.

When quantum-enabled decryption becomes practical, it won't arrive in a
vacuumit will land in an ecosystem already riddled with hidden access paths
and dormant footholds. 

This risk is amplified by how modern computing actually works. The digital
fabric no one fully sees Most organizations are no longer running a single
generation of technology. Instead, they operate a complex mix of legacy
systems, containerized applications , serverless functions, and increasingly,
AI agents that move autonomously across environments. 

These workloads span multiple cloud providers, on-premises infrastructure, 
and hundreds of SaaS platforms stitched together by APIs, identities, and
network connections few organizations fully understand. 

This interconnected cloud environment is a constantly shifting web of
dependencies, permissions, and data flows. 

Security failures rarely occur because one system is unprotected; they happen
at the seams Recent incidents illustrate this: a SaaS integration drift that
silently exposed customer data across trust boundaries, or an automation
platform vulnerability that gave attackers lateral movement through
orchestration workflows. 

These aren't hypothetical. They're the kinds of gaps adversaries exploit
daily. 

Regulators have taken notice. Frameworks like CISA's Zero Trust Maturity 
Model 2.0 now mandate runtime proof of zero trust enforcement, not just 
policy documentation. 

The EU's DORA and NIS2 directives require segmentation and full-path
encryption. These aren't aspirational targetsthey're compliance deadlines 
that most multi-cloud environments aren't prepared to meet. AI accelerates 
the attack surface AI accelerates this fragility. Autonomous AI tools now
traverse systems at machine speed, chaining together actions across databases,
APIs, and services in seconds.

A compromised agentwhether through stolen credentials, manipulated prompts, 
or poisoned training datacan escalate privileges and exfiltrate data across
cloud boundaries before a human analyst even triages the first alert. 

This is where the industrys traditional mental model breaks down. The
perimeter is gone, but security hasnt caught up For decades, cybersecurity 
has been organized around the idea of a perimeter: trusted systems on the
inside, threats on the outside. But in cloud and multicloud environments, 
that boundary no longer exists. 

Every workload is potentially exposed because the threats live within the
network fabric between those workloads. Every connection is a potential 
attack path. Even the infrastructure designed to enforce boundariesVPNs,
gateways, edge deviceshas increasingly become a primary target for
exploitation. 

In a post-perimeter world, slogans about zero trust are no longer enough. The
concept must move from policy statements into enforceable architectureapplied
not just at login, but continuously, at the workload level, across every
environment. From slogans to enforceable architecture This shift requires two
foundational changes. 

First, organizations must gain real visibility into east-west traffic: the
lateral movement between workloads that attackers use to escalate privileges
and reach high-value assets. 

Most security tooling still focuses on north-south trafficwhat enters and
exits the environmentwhile missing the internal pathways where breaches
actually unfold. 

Second, security intent must be expressed in terms that reflect how modern
systems operate. Static controls built around IP addresses and fixed
infrastructure fail in environments dominated by ephemeral workloads and
dynamic scaling. 

Instead, access decisions must be tied to workload identity, function, and
behavior regardless of where that workload happens to run. 

Taken together, these capabilities define what the industry is beginning to
call a cloud-native security fabric: a unifying layer that provides 
continuous visibility into east-west traffic, enforces consistent policy
across every cloud and data center, and constrains lateral movementwithout
requiring organizations to rip and replace their existing infrastructure. 

When paired with zero-trust principles applied directly to workloadsnot just
usersthis model offers a way to contain breaches even when attackers gain an
initial foothold. Preparing for quantum without waiting for it None of this
eliminates the quantum threat. But it changes the equation. 

Quantum computing may eventually break todays encryption. Complexity, 
however, is already breaking todays defenses. Organizations that wait for
quantum-safe cryptography standards while ignoring architectural weaknesses
risk being compromised long before quantum computers reach maturity. 

In August 2024, NIST finalized its first three post-quantum encryption
standardsa landmark step. Organizations should absolutely begin planning 
their cryptographic migration. But adopting new algorithms alone is not
enough. Complexity is already breaking today's defenses. 

Organizations that pursue quantum-safe cryptography while ignoring the
architectural weaknesses underneath it are reinforcing the walls of a 
building with a crumbling foundation. The risk isnt suddenits cumulative The
real danger isnt an overnight quantum apocalypse. Its a slow-burn 
failurewhere harvested data, unchecked lateral movement, and unmanaged AI
systems converge into a security crisis that feels sudden only in hindsight. 

The path forward starts now: audit your encryption posture, map the lateral
pathways through your cloud environments, and begin migrating to quantum-safe
standards. 

But don't stop at cryptography. 

The organizations that will weather the quantum transition are those building
security into the network fabric itselfwhere trust is enforced continuously,
at the workload level, across every environment. 

Because while AI may change how we work, quantum computing could change
whether our digital foundations can be trusted at all.
 
This article was produced as part of TechRadarPro's
Expert Insights channel where we feature the best and brightest minds in the
technology industry today. The views expressed here are those of the author
and are not necessarily those of TechRadarPro or Future plc. If you are
interested in contributing find out more here:
https://www.techradar.com/news/submit-your-story-to-techradar-pro

Link to news story:
https://www.techradar.com/pro/forget-the-ai-armageddon-quantum-computing-is-th
e-real-threat-to-digital-security

$$
--- SBBSecho 3.28-Linux
 * Origin: Capitol City Online (1:2320/107)

-----------------------------------------------------------
[Voltar]