3 Ways to Prepare Your Business for the Inevitable Quantum Revolution

2022-08-24 20:42:09
关注

Technology has continually evolved rapidly to meet business needs. However, the rapid pace of evolution often leaves companies dealing with new risks, some of which they fail to anticipate. Quantum computing is the next technological frontier offering immense potential and risks.

McKinsey and Company believe that the value at stake for quantum computing use cases is worth over $80 billion. The size of the industry could surpass that within the next few years. However, quantum computing is incompatible with current cybersecurity postures.

Quantum tech processes information differently from today's computers. These processes can handle more data and deliver insights at blazing speed. As a result, companies must upgrade their infrastructure and the security processes guarding them.

Here are three ways enterprises can execute right now to prepare for the quantum future.

Related: Cybersecurity Is No Longer An Option. Your Money Is in Immediate Danger.

Explore process flexibility

Quantum computing's power comes from its building block: a Qubit. Traditional computers process information in binary code, a string of zeros and ones, to decode and create output. Quantum computers ditch binary strings for the much more volatile Qubit, a string of information that allows the processor to explore several paths to a solution. In addition, the Qubit frees the computer to deal with several inputs at once.

The upshot of this fundamental change is that the current security infrastructure will soon become outdated. Most organizations currently use a hybrid of cloud and on-premise apps to enforce security. However, these solutions move at speed limited by hardware. They process information at an infinitesimally slow pace compared to the rates at which quantum processors move.

An attack on a system executed by a quantum computer will likely cripple most hardware infrastructure. Solutions providers are currently grappling with this issue by upgrading their technology and installing quantum tech.

However, given quantum technology's nascent condition, experts struggle to predict the final form a solution will take. Enterprises must begin rethinking the flexibility in their infrastructure since they'll have to adapt to new conditions quickly once quantum computing fully arrives.

Aside from researching the threats quantum computing poses, companies must also rethink their security models. For instance, most systems are secured by passwords backed by 2FA authentication. Password or key-centric access is vulnerable to quantum computing power despite multiple security layers.

Currently, secret vaults store keys and assign new ones based on a processor's ability to break them. As a result, most keys to securing company secrets are tricky for existing processors but a cakewalk for quantum processors.

Implementing password-less access via FIDO protocols is a possible solution. Keeping up to date with NIST's recommendations is another option companies should explore.

Related: Quantum Computing Threatens Everything — Could it be Worse Than the Apocalypse?

Invest in talent

Cybersecurity is challenging, and companies are hard-pressed to find the right talent. Most developers lack a security background, choosing to specialize in application development aligned with agile practices. As a result, security talent is short.

The arrival of quantum computing adds another layer to the challenge. Quantity computing talent is low, and quantum security talent is challenging to find. One solution for enterprises is to invest in educating existing talent and upskilling employees.

Offering grants and other incentives to rising talent is another way for companies to adopt a robust stance. Companies following this path have the chance to pioneer the field of quantum cybersecurity, something that will stand them in good stead in the future.

Aside from developing talent pipelines, companies must also use analytics to plug holes in their security postures. Using what-if scenarios, corporations can create a risk matrix that identifies potential breaches if a quantum threat ever occurs. For instance, they can identify which systems are most at risk and which data will likely suffer an impact.

Analytics cannot fully comprehend the speed of quantum processors currently. However, by modeling extreme scenarios on these platforms, companies can check the impact on their processes and create recovery plans.

Recognize the opportunity

Quantum computers' abilities currently fall short of traditional computing power. However, the technology has an immense runway. Transitioning to a fully quantum model will take time, and companies must begin preparing immediately.

Much like how VR and AI technologies suffered phases of low interest, quantum computing will experience periods where investment and enthusiasm will diminish. However, companies must not mistake this natural phenomenon as an excuse to stop preparing for a quantum future.

Despite the so-called AI winter, AI is present in almost every platform and process in several industries. Similarly, quantum computing is bound to make its way into several applications. To successfully transition, companies must evaluate their business goals and define the scope of their adoption projects.

For instance, algorithms that are currently too sophisticated to execute via traditional computing must be defined and stored safely. Their infrastructure needs must be specified. Most importantly, the security processes they will need must be identified. Working backward from these needs, companies can identify the steps they must take to get there.

Preparation is the key because when quantum computing fully arrives, those left behind will find it tough to make up lost ground.

A promising future

Quantum computing is set to relegate current technology to the level of the abacus. While the technology still has a ways to go before it is used widely, there's undoubtedly colossal potential. Only time will tell what the future will look like. However, enterprises must seize the opportunity to secure their risks and map development plans to match quantum needs right now.

Related: What Small Businesses Need to Know About the Future of Cybersecurity and Hackers

参考译文
3种方法为不可避免的量子革命做好准备
技术一直在迅速发展以满足商业需求。然而,这种快速演进的步伐常常使企业面临新的风险,其中一些风险甚至无法预见。量子计算是下一个技术前沿,它既蕴含着巨大的潜力,也带来同样巨大的风险。麦肯锡公司认为,量子计算的应用场景所涉及的价值超过800亿美元,而该行业的规模可能在不久的将来就将超过这一数字。然而,量子计算与当前的网络安全态势并不兼容。量子技术处理信息的方式不同于当今的计算机。它能够处理更多数据,并以惊人的速度提供洞察力。因此,企业必须升级其基础设施以及保护这些设施的安全流程。以下是企业现在可以采取的三种方式,为迎接量子时代做好准备。相关:网络安全不再是可选项,你的资金正面临即时风险。探索流程灵活性 量子计算的力量源于其基本构建单元:量子比特(Qubit)。传统计算机通过二进制代码(一串0和1)来解码并生成输出。而量子计算机则摒弃了二进制字符串,改用更加不稳定的量子比特,这是一种可以允许处理器同时探索多个解决方案路径的信息串。此外,量子比特还使计算机能够同时处理多个输入。这种根本性的变化意味着,当前的安全基础设施很快就会过时。目前,大多数组织采用云端和本地应用的混合方式来实施安全措施。然而,这些解决方案的速度受限于硬件。与量子处理器的运行速度相比,它们处理信息的速度几乎可以忽略不计。一旦量子计算机对系统发起攻击,很可能将严重破坏大多数硬件基础设施。目前,解决方案提供商正在通过升级技术并部署量子技术来应对这一问题。然而,鉴于量子技术仍处于早期发展阶段,专家们难以准确预测最终的解决方案形式。因此,企业必须开始重新思考其基础设施的灵活性,因为当量子计算全面到来时,他们将需要迅速适应新的环境。除了研究量子计算所带来的威胁,公司还必须重新审视其安全模型。例如,大多数系统是通过密码搭配双因素(2FA)认证来保护的。尽管有多个安全层,但以密码或密钥为中心的访问模式在量子计算面前并不安全。目前,秘密保险库通过处理器的破解能力来存储密钥并分配新的密钥。因此,大多数用于保护企业秘密的密钥对于现有处理器来说颇具挑战,却对量子处理器来说是轻而易举的事。通过FIDO协议实现无密码访问可能是解决办法之一。另外,企业还应关注美国国家标准与技术研究院(NIST)的建议,作为另一种可行选择。相关:量子计算威胁一切——它可能比世界末日更糟糕吗?投资人才 网络安全极具挑战性,企业很难找到合适的人才。大多数开发人员缺乏安全背景,倾向于专注于与敏捷开发实践相匹配的应用开发。因此,安全人才十分短缺。量子计算的到来为这一挑战又增加了一层。量子计算领域的人才稀缺,而量子安全领域的人才更是难寻。对企业而言,一个可行的解决方案是投资培养现有员工,并提升其技能。为新兴人才提供资助及其他激励措施也是企业采取稳健立场的另一种方式。选择这条路径的公司有机会率先在量子网络安全领域取得突破,这将为其未来发展奠定坚实的基础。除了建立人才储备,企业还必须利用数据分析来弥补其安全态势中的漏洞。通过“假设场景”分析,公司可以创建一个风险矩阵,识别出如果量子威胁真的发生时的潜在漏洞。例如,他们可以识别出哪些系统风险最大,哪些数据可能会受到严重影响。目前,数据分析还无法完全理解量子处理器的速度。然而,通过在这些平台上模拟极端情况,公司可以评估其对流程的影响,并制定恢复计划。识别机遇 目前量子计算机的能力还无法超越传统计算机。然而,这项技术仍有巨大的发展空间。向完全量子模型的过渡将需要时间,企业必须立即开始准备。 正如虚拟现实(VR)和人工智能(AI)技术曾经历低关注度阶段一样,量子计算也将经历投资和热情下降的时期。然而,企业绝不能将这一自然现象误以为是暂停为量子未来做准备的借口。 尽管有所谓的“AI冬天”,AI如今已几乎渗透到多个行业的几乎所有平台和流程中。同样,量子计算也必将进入多个应用场景。为了成功实现过渡,企业必须评估其商业目标,并明确其采用计划的范围。 例如,那些目前还无法通过传统计算执行的过于复杂的算法,必须被定义并安全地存储。他们的基础设施需求必须被明确。最重要的是,他们需要的安全流程也必须被识别。从这些需求出发,企业可以识别出实现它们所需的步骤。 准备是关键,因为当量子计算全面到来时,那些准备不足的企业将很难弥补落后的差距。 充满希望的未来 量子计算注定会将当前技术降至算盘的层级。尽管这种技术仍有一段路要走,才能被广泛使用,但其潜力无疑是巨大的。只有时间才能告诉我们未来会是什么样子。然而,企业必须抓住机会,立即开始保护其风险,并制定符合量子需求的发展计划。 相关:小型企业应了解网络安全和黑客的未来
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告

entrepreneur

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

人工智能对VPN技术未来的影响

提取码
复制提取码
点击跳转至百度网盘