Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Keywords: » quantum computing

Items Tagged with 'quantum computing'

ARTICLES

Old rendered computer

Only 5% of Organizations Have Deployed Quantum-Safe Encryption

Security Staff
May 13, 2025

As the era of quantum computing approaches, many organizations still experience gaps in preparedness.


Read More
Green planes reflected

95% of Organizations Have No Quantum Computing Roadmap

Security Staff
May 5, 2025

Most organizations are unprepared for the era of quantum computing.


Read More
Burst of light

Cyber leaders must prepare quantum security now, research finds

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
March 14, 2025

Cybersecurity leaders share their insights on the state of quantum computing.  


Read More
Rendered stairway and door

Quantum computing could arrive soon due to Microsoft’s new chip

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
February 24, 2025

According to Microsoft, quantum computers could be built within years instead of decades, citing a recent breakthrough. 


Read More
Futuristic digital monolith

Preparing for a post-quantum future amid machine identities

Bocek headshot
Kevin Bocek
August 30, 2024

By focusing on machine identity management practices that incorporate post-quantum cryptography, organizations can build a secure foundation in both the present and the quantum future.


Read More
Greg Wetmore podcast news header

How do security leaders prepare for quantum computing?

Listen to Greg Wetmore, VP of Software Development at Entrust, in this podcast episode.
Security Staff
September 14, 2023

Listen to this episode of The Security Podcasts with Greg Wetmore, VP of Software Development at Entrust, as he discusses quantum computing.


Read More
software on computer screens

CISA publishes resource for migrating to post-quantum cryptography  

Security Staff
August 29, 2023

CISA urges organizations to begin early planning for migration to post-quantum cryptographic standards by developing quantum-readiness roadmaps.


Read More
blurred keyboard with wavy lines

The impact of quantum computers and IoT devices on network security

Rudy Hoebeke
July 7, 2023

The quantum threat comes from brute force and the exponential advantage of quantum computers to solve particular classes of computational problems.


Read More
keyboard keys swirled together

What CISOs need to know to mitigate quantum computing risks

David Bader
June 2, 2023

Although quantum computing can lead to positive and transformative solutions, the development also poses a significant threat to cybersecurity.


Read More
cyber security
Global News

IT leaders give mixed signals on enterprise investments

Taelor Daugherty
Taelor Sutherland
April 10, 2023

IT leaders provide an insight to security enterprise futures.


Read More
More Articles Tagged with 'quantum computing'
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing