CINXE.COM
Quantum computing: the inevitable threat to information security
<!DOCTYPE html> <!-- Development: JULIO FOULQUIE, @j3j5@hachyderm.io, ✈Montevideo, UY MARC TORAL, ✈Amsterdam, NL JULIAN SZNAIDER, ✈Buenos Aires, AR —————————— Concept and Design by: ALEXANDER GRIFFIOEN, @oscaralexander, ✈Amsterdam, NL SÄINA SEEDORF, ✈Amsterdam, NL —————————— Alumni: JACK DUNN, ✈Amsterdam, NL JULIAN AIJAL, @Jaijal, ✈Amsterdam, NL SAM BLOK, ✈Amsterdam, NL LAURA GENNO, ✈Amsterdam, NL IRENE DE NICOLO, ✈Amsterdam, NL DANIEL TARA, ✈Amsterdam, NL EVGENY ASTAPOV, ✈Rotterdam, NL RONAN O'LEARY, @ro_oleary, ✈Amsterdam, NL PABLO ROMÁN, ✈Amsterdam, NL JAMES SCOTT, ✈Amsterdam, NL JELLE VAN WIJHE, ✈Amsterdam, NL MATTHEW ELWORTHY, ✈Amsterdam, NL OSCAR VAN ZIJVERDEN, ✈Amsterdam, NL STEPHAN LAGERWAARD, ✈Amsterdam, NL --> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1"> <meta content="IE=edge,chrome=1" http-equiv="X-UA-Compatible"> <meta content="telephone=no" name="format-detection"> <meta content="unsafe-url" name="referrer"> <meta content="The Next Web" name="apple-mobile-web-app-title"> <script async src="https://www.googletagmanager.com/gtag/js?id=G-1FX48DMMCB"></script> <link rel="preload" href="//next.tnwcdn.com/assets/next/css/base.css?3d092509c4c6da02d7b420a4fa2cf897d7f1145e" as="style"> <link rel="preload" as="script" href="//next.tnwcdn.com/assets/next/js/base.js?3d092509c4c6da02d7b420a4fa2cf897d7f1145e" > <link rel="preload" href="//next.tnwcdn.com/assets/next/css/media.css?3d092509c4c6da02d7b420a4fa2cf897d7f1145e" as="style"> <link rel="preload" href='https://next.tnwcdn.com/assets/next/fonts/graphik-wide-black.woff2' as='font' type='font/woff2' crossorigin='anonymous'> <link rel='preload' as="image" media="(min-width: 361px) and (min-height: 651px)" href="https://img-cdn.tnwcdn.com/image?fit=1280%2C720&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=e85756c3fd1e06f33851117b59bcaa09" imagesrcset="https://img-cdn.tnwcdn.com/image?fit=576%2C324&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=a630528467b03700f2c061c7af211aec 576w, https://img-cdn.tnwcdn.com/image?fit=1152%2C648&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=0279549fad4f556600d269e686f4c508 1152w, https://img-cdn.tnwcdn.com/image?fit=1280%2C720&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=e85756c3fd1e06f33851117b59bcaa09 1280w" > <title>Quantum computing: the inevitable threat to information security</title> <!-- OpenGraph --> <meta name="author" content="Amir Vashkover"> <meta name="original-source" content="https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable" /> <meta content="TNW | Data-Security" property="og:site_name" /> <meta content="Quantum computing: the inevitable threat to information security" property="og:title" /> <meta name="description" content="In an era where technological advancements continually reshape our world, one of the most significant emerging threats is quantum computing. This powerful technology, while promising revolutionary benefits, poses a substantial risk to our " property="description" /> <meta content="In an era where technological advancements continually reshape our world, one of the most significant emerging threats is quantum computing. This powerful technology, while promising revolutionary benefits, poses a substantial risk to our " property="og:description" /> <meta content="https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable" property="og:url" /> <meta content="640" property="og:image:height" /> <meta content="1280" property="og:image:width" /> <meta content="https://img-cdn.tnwcdn.com/image/tnw-blurple?filter_last=1&fit=1280%2C640&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=e8841e3079ceeb5882a5625a1cf81589" property="og:image" /> <meta content="article" property="og:type" /> <meta property="og:locale" content="en_US"> <meta property="og:updated_time" content="2024-08-29T14:01:09+00:00" /> <meta property="article:published_time" content="2024-08-29T12:37:42+00:00" /> <meta property="article:modified_time" content="2024-08-29T14:01:09+00:00" /> <meta property="article:section" content="Data and security"> <!-- Twitter Card --> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:site" content="@thenextweb" /> <meta name="twitter:creator" content="@thenextweb" /> <meta name="twitter:title" content="Quantum computing: the inevitable threat to information security" /> <meta name="twitter:image" content="https://img-cdn.tnwcdn.com/image/tnw-blurple?filter_last=1&fit=1280%2C640&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=e8841e3079ceeb5882a5625a1cf81589" /> <meta name="twitter:description" content="In an era where technological advancements continually reshape our world, one of the most significant emerging threats is quantum computing. This powerful technology, while promising revolutionary benefits, poses a substantial risk to our " /> <!-- General Meta --> <meta name="robots" content="max-image-preview:large"> <meta content="Quantum computing: the inevitable threat to information security" property="title" /> <meta content="In an era where technological advancements continually reshape our world, one of the most significant emerging threats is quantum computing. This powerful technology, while promising revolutionary benefits, poses a substantial risk to our " property="description" /> <meta content="https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable" property="url" /> <link rel="apple-touch-icon" sizes="57x57" href="//next.tnwcdn.com/assets/img/favicon/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//next.tnwcdn.com/assets/img/favicon/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//next.tnwcdn.com/assets/img/favicon/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//next.tnwcdn.com/assets/img/favicon/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//next.tnwcdn.com/assets/img/favicon/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//next.tnwcdn.com/assets/img/favicon/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//next.tnwcdn.com/assets/img/favicon/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//next.tnwcdn.com/assets/img/favicon/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//next.tnwcdn.com/assets/img/favicon/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//next.tnwcdn.com/assets/img/favicon/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//next.tnwcdn.com/assets/img/favicon/favicon-48x48.png" sizes="48x48"> <link rel="icon" type="image/png" href="//next.tnwcdn.com/assets/img/favicon/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//next.tnwcdn.com/assets/img/favicon/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//next.tnwcdn.com/assets/img/favicon/favicon-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//next.tnwcdn.com/assets/img/favicon/favicon-16x16.png" sizes="16x16"> <link rel="shortcut icon" href="//next.tnwcdn.com/assets/img/favicon/favicon-16x16.png"> <link rel="icon" href="/favicon.ico"> <script src="//next.tnwcdn.com/assets/js/lib/modernizr-custom.js?3d092509c4c6da02d7b420a4fa2cf897d7f1145e" async></script> <link rel="manifest" href="/manifest.json"> <script type="module" src="https://cdn.jsdelivr.net/npm/@justinribeiro/lite-youtube@1.3.1/lite-youtube.js"></script> <style>body{visibility:hidden;}</style> <script type="text/javascript"> window.dataLayer = window.dataLayer || []; </script> <script type="text/javascript" async> window.dataLayer = window.dataLayer || []; dataLayer.push({"page":{"type":"article","article":{"id":1409776,"nextId":"129e8b8be417328a74699c149d8f300642d18b6d","url":"https:\/\/https:\/\/thenextweb.com\/news\/quantum-computing-threat-information-security-inevitable","description":"Quantum computing: the inevitable threat to information security","words":1396,"topics":[{"slug":"security","type":"topic","name":"Security","description":null}],"wordlift":[],"companies":[],"profiles":[],"events":[]},"authors":["Amir Vashkover"],"post-status":"published","primary_category":"data-security","sections":[],"categories":["data-security","government-policy","corporates-innovation"],"modifiedAt":"2024-08-29T14:01:09+00:00","publishedAt":"2024-08-29T12:37:42+00:00","time":"12:37 PM","date":"2024-08-29","datePublished":"2024-08-29 12-37","publishedWeek":"2024-35","ads":{"roadblocked":0,"sponsor":"","sponsoredCategory":"","sponsored":false,"client":null,"campaign_name":null,"product_type":null}}});</script> <script type="text/javascript" async> window.dataLayer = window.dataLayer || []; window.dataLayer.push({"event":"Mentions","nonInteraction":true,"wl_event_action":"Mentions","wl_event_category":"WordLift","wl_event_label":"Security","wl_event_type":"http:\/\/schema.org\/Thing","wl_event_uri":"https:\/\/data.thenextweb.com\/tnw\/entity\/security","wl_event_value":1,"wl_index_type":"2","wl_index_uri":"1"}); </script> <link href="//next.tnwcdn.com/assets/next/css/base.css?3d092509c4c6da02d7b420a4fa2cf897d7f1145e" rel="stylesheet" type="text/css"> <link href="//next.tnwcdn.com/assets/next/css/media.css?3d092509c4c6da02d7b420a4fa2cf897d7f1145e" rel="stylesheet" type="text/css"> <noscript> <link href="//next.tnwcdn.com/assets/next/css/media.css?3d092509c4c6da02d7b420a4fa2cf897d7f1145e" rel="stylesheet" type="text/css"> </noscript> <meta http-equiv="Content-Security-Policy" content="upgrade-insecure-requests"> <link rel="dns-prefetch" href="//cdn0.tnwcdn.com/"> <link rel="dns-prefetch" href="//next.tnwcdn.com/"> <link rel="dns-prefetch" href="//img-cdn.tnwcdn.com/"> <link rel="dns-prefetch" href="//cdnjs.cloudflare.com/"> <link rel="dns-prefetch" href="//www.googletagmanager.com"> <link rel="preconnect" href="//cdn0.tnwcdn.com/"> <link rel="preconnect" href="//next.tnwcdn.com/"> <link rel="preconnect" href="//img-cdn.tnwcdn.com/"> <link rel="preconnect" href="//www.googletagmanager.com"> <link rel="preconnect" href="//cdnjs.cloudflare.com/"> <link rel="stylesheet preload" as="style" href="//use.fontawesome.com/releases/v5.6.3/css/all.css" integrity="sha384-UHRtZLI+pbxtHCWp1t77Bi1L4ZtiqrqD80Kn4Z8NTSRyMA2Fd33n5dQ8lWUE00s/" crossorigin="anonymous" async> <link rel="canonical" href="https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable"/> <script async src="https://securepubads.g.doubleclick.net/tag/js/gpt.js"></script> <!-- JSON-LD Breadcrumbs --> <script type="application/ld+json"> {"@context":"http:\/\/schema.org","@id":"#Breadcrumb","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"item":{"@id":"https:\/\/thenextweb.com","name":"Home"}},{"@type":"ListItem","position":2,"item":{"@id":"https:\/\/thenextweb.com\/data-security","name":"Data-security"}},{"@type":"ListItem","position":3,"item":{"@id":"https:\/\/thenextweb.com\/news\/quantum-computing-threat-information-security-inevitable","name":"Quantum computing: the inevitable threat to information security"}}]} </script> <!-- JSON-LD schema --> <script type="application/ld+json"> [{"@id":"https://data.thenextweb.com/tnw/post/-1409776","url":"https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable","name":"Quantum computing: the inevitable threat to information security","@type":"NewsArticle","image":[{"@type":"ImageObject","url":"https://img-cdn.tnwcdn.com/image?fit=1200%2C675&height=675&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=eae8f60ed5fedfde7caf2a586748414f","width":1200,"height":675},{"@type":"ImageObject","url":"https://img-cdn.tnwcdn.com/image?fit=1200%2C900&height=900&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=ec1d3deba375d7ba5dedf2a61265fdd2","width":1200,"height":900},{"@type":"ImageObject","url":"https://img-cdn.tnwcdn.com/image?fit=1200%2C1200&height=1200&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=ac682c69a58e65addfc23d0faa88f763","width":1200,"height":1200},{"url":"https://cdn0.tnwcdn.com/wp-content/blogs.dir/1/files/2024/06/quantum-computer-e1718827535583.jpg","@type":"ImageObject","width":"1280","height":"853"}],"author":{"@id":"https://data.thenextweb.com/tnw/author/amirvashkover","url":"https://thenextweb.com/author/amirvashkover/","name":"Amir Vashkover","@type":"Person","givenName":"Amir","familyName":"Vashkover"},"@context":"http://schema.org","headline":"Quantum computing: the inevitable threat to information security","publisher":{"@id":"https://data.thenextweb.com/tnw/entity/tnw","logo":{"url":"https://cdn1.tnwcdn.com/wp-content/blogs.dir/1/files/2016/06/tnw-logo-amp.png","@type":"ImageObject","width":"284","height":"60"},"name":"The Next Web","@type":"Organization","sameAs":["http://www.wikidata.org/entity/Q2913725","http://dbpedia.org/resource/TNW_(website)","http://rdf.freebase.com/ns/m.0h7njwd","https://en.wikipedia.org/wiki/The_Next_Web","https://www.facebook.com/thenextweb","https://www.twitter.com/thenextweb","https://instagram.com/thenextweb","https://www.youtube.com/user/thenextweb","https://www.pinterest.com/thenextweb/","https://www.linkedin.com/topic/the-next-web","https:/vine.co/thenextweb","https://soundcloud.com/thenextweb","https://vimeo.com/thenextweb","https://vk.com/thenextweb","https://www.slideshare.net/thenextweb","https://flipboard.com/@thenextweb","https://storify.com/thenextweb","https://www.stumbleupon.com/channel/thenextweb","https://www.flickr.com/photos/thenextweb/","https://foursquare.com/thenextweb","https://dbpedia.org/page/TNW_(website)"]},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".c-header__heading",".c-richText > p"]},"wordCount":"991","inLanguage":"en-US","articleBody":"In an era where technological advancements continually reshape our world, one of the most significant emerging threats is quantum computing.\u00a0\r\n\r\nThis powerful technology, while promising revolutionary benefits, poses a substantial risk to our current cybersecurity infrastructure. As we stand on the brink of this quantum revolution, it is imperative to understand the potential dangers and prepare accordingly.\r\nThe quantum leap \u00a0\u00a0\u00a0\u00a0\u00a0\r\nQuantum computing harnesses the principles of quantum mechanics to perform computations at speeds unimaginable with classical computers. In 2019, Google proclaimed to have demonstrated \u201cquantum supremacy\u201d when its Sycamore processor solved a problem in 200 seconds that would take the most advanced classical supercomputers nearly 10,000 years.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\r\n\r\nWhile the specific feat was disputed, there is no denying that quantum computing has made tremendous strides toward computation capabilities that are far beyond today\u2019s fastest HPC systems. More recent progress signals the approaching reality of quantum computers capable of breaking existing encryption methods.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\r\nThe quantum threat\r\nCurrent encryption methods, which protect everything from personal data to national security information, rely on the difficulty of solving mathematical problems that classical computers cannot handle efficiently. Quantum computers, however, can solve these problems exponentially faster, rendering traditional encryption obsolete. The risks include:\r\n\r\n \tData Interception and Misuse: All encrypted data could be at risk of interception and decryption by quantum computers.\r\n \t\u201cHarvest Now, Decrypt Later\u201d Attacks: Malicious actors might collect encrypted data now with the intention of decrypting it once quantum computers become available.\r\n \tCompromise of Critical Systems: Failure to migrate to quantum-safe algorithms could lead to breaches in critical business and functional systems, affecting industries like healthcare, finance, and government.\r\n\r\nIn August 2021, the US National Security Agency (NSA) announced that \u201cadversarial use of a quantum computer could have devastating effects on National Security Systems and the nation as a whole. The enhanced security measures employed by quantum cryptography make it virtually difficult to breach and tackle this situation, offering a level of protection that far exceeds traditional encryption methods, driving the market growth.\u201d\u00a0\r\nWho should be concerned?\u00a0\r\nOrganizations handling confidential data with long-term confidentiality needs, such as personal identifiable information (PII), personal health information (PHI), legal documents, and intellectual property, are at significant risk. Additionally, organizations providing systems with long lifespans, such as medical devices, and suppliers to critical industries must prioritize preparing for quantum threats.\r\nPreparing for the quantum era\u00a0\r\nThe question is not if quantum computers will break current encryption, but when. Predictions vary, with some experts estimating significant impacts within the next decade. For example, Deloitte suggests serious quantum threats could emerge within ten years, while Forrester forecasts a 50% to 70% chance within five years.\r\nSteps to mitigation\r\nTo mitigate these impending threats, organizations must adopt a proactive approach:\r\n\r\n \tUnderstand Business Contexts and Objectives: Recognize how quantum threats impact specific business operations and data.\r\n \tIdentify Quantum Threats: Assess which aspects of the business are most vulnerable to quantum attacks.\r\n \tDefine Target Maturity: Set goals for achieving quantum-safe security measures.\r\n \tAssess Current Capabilities: Evaluate existing security measures against future quantum threats.\r\n \tFocus on Priorities: Prioritize areas that need immediate attention to enhance quantum resilience.\r\n \tDevelop a Quantum Security Roadmap: Create a detailed plan for transitioning to quantum-safe cryptography algorithms.\r\n \tShow Value from Investments: Communicate the importance and benefits of quantum security investments to stakeholders.\r\n \tRaise Awareness: Educate all levels of the organization about the quantum threat and necessary precautions.\r\n\r\nPost Quantum Cryptography (PQC) initiatives\r\nPost Quantum Cryptography (PQC) is a current top national security priority for most governments. NIST has been struggling with figuring out the next gen FIPS 140.3 (512 bit) regulatory PQC standards, with the very first release starting in August 2024. Of which, Quantum Knight is within the first group of FIPS 140.3 module validations.\r\n\r\nThese new NIST PQC algorithms are raw ciphers only, not a cryptographic system like CLEAR. After their release on August 13, these NIST algorithms will now have to be made useful and implemented over the next 3-10 years across the entire data ecosystem mentioned above.\r\n\r\nGoogle, Apple, IBM, and others have started upgrading the cryptography within their systems and services and started industry consortiums to begin to discuss and learn how they can implement and make these new algorithms useful for their customers. These efforts only attempt to upgrade their current broken distributed data ecosystem (i.e. the hops/jumps/pass-thrus).\r\nThe road ahead\u00a0\r\nTransitioning to quantum-safe algorithms is not a straightforward process. It involves:\r\n\r\n \tCollaboration: Working with academia, industry, and governments to develop and standardize quantum-resistant algorithms.\r\n \tResource Allocation: Investing wisely in quantum security technologies and processes.\r\n \tEducation: Ensuring stakeholders understand the risks and necessary measures using clear and common terms.\r\n \tComprehensive Approach: Beyond algorithms, reevaluating protocols, standards, and hardware components to ensure holistic security.\r\n\r\nDespite these advancements, the real challenge lies in the implementation and integration of quantum cryptographic solutions. \r\n\r\nMany companies struggle to transition from theoretical models to practical applications, resulting in a gap between promise and performance. This is where pioneering startups such as Quantum Knight come in, providing robust and reliable solutions that not only meet but exceed industry standards.\r\nConclusion\r\nThe advent of quantum computing is a double-edged sword, offering unparalleled computational power while threatening to undermine our current cybersecurity frameworks. Organizations must act now, understanding the threat, preparing for the inevitable, and transitioning to quantum-safe practices. \r\n\r\nWhile the timeline remains uncertain, the proactive steps taken today will safeguard the future against the quantum threat.\r\n\r\nAmir Vashkover is a seasoned technology leader with vast experience in both operational and leadership roles within the field of Cybersecurity. He currently leads Philips\u2019 Data Security division and is a board advisor at post-quantum encryption provider Quantum Knight. Before that, Amir held leadership positions across multiple industries, including roles as CISO, VP of Business development and Product management. He holds a university degree in Electrical &amp; Computer engineering, and an MBA from leading universities in Israel.","dateCreated":"2024-08-29T12:37:42+00:00","description":"In an era where technological advancements continually reshape our world, one of the most significant emerging threats is quantum computing.\u00a0\r\n\r\nThis powerful technology, while promising ...","commentCount":"0","dateModified":"2024-08-29T14:01:09+00:00","copyrightYear":"2016","datePublished":"2024-08-29T12:37:42+00:00","articleSection":"Data and security","copyrightHolder":{"@id":"https://data.thenextweb.com/tnw/entity/tnw"},"mainEntityOfPage":{"@id":"https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable","@type":"WebPage","breadcrumb":{"@id":"#Breadcrumb"}},"sourceOrganization":{"@id":"https://data.thenextweb.com/tnw/entity/tnw"},"interactionStatistic":[{"@type":"InteractionCounter","interactionType":"https://schema.org/ShareAction","interactionService":{"url":"http://www.twitter.com","name":"Twitter","@type":"Website"},"userInteractionCount":"0"},{"@type":"InteractionCounter","interactionType":"https://schema.org/ShareAction","interactionService":{"url":"http://www.facebook.com","name":"Facebook","@type":"Website"},"userInteractionCount":"0"},{"@type":"InteractionCounter","interactionType":"https://schema.org/ShareAction","interactionService":{"url":"https://www.reddit.com","name":"Reddit","@type":"Website"},"userInteractionCount":"0"},{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":"0"}]}] </script> <script> var APP_ENV = { 'site_url': 'https://thenextweb.com/' + '', 'cookie_domain': '.thenextweb.com' }; </script> <script> (function () { window.dataLayer = window.dataLayer || []; window.dataLayer.push(arguments); window.dataLayer.push({ event: 'defaultConsentSet', consentStatus: arguments[2], }); window.dispatchEvent(new CustomEvent('defaultConsentSet', { detail: { consent: arguments[2], }, })); }('consent', 'default', (function () { const defaults = { ad_storage: 'denied', analytics_storage: 'denied' }; let cookie = document.cookie.split('; ').find(function(row) { return row.startsWith('__tnw_cookieConsent='); }); if (typeof cookie === 'undefined') { return defaults; } cookie = cookie.slice(20); try { cookie = JSON.parse(decodeURIComponent(cookie)); } catch (e) { return defaults; } return cookie; }()))); </script><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-MHDDSC');</script> </head> <body class="site-tnwNext preload" id="next-top"> <a class="skip-link" href="#main">Skip to content</a> <!-- Google Tag Manager --> <noscript> <iframe height="0" src="//www.googletagmanager.com/ns.html?id=GTM-MHDDSC" style="display: none; visibility: hidden;" width="0"></iframe> </noscript> <!-- End Google Tag Manager --> <div id="fb-root"></div> <div id="_progress" class="data-security"></div> <nav class="c-nav has-level2" id="nav" role="navigation" style="top: 0;"> <div class="c-nav__level1"> <button class="c-nav__menuToggle c-nav__menuToggle--level-1 js-menuToggleLevel" data-nav-level="1" id="nav-menuLevel1" type="button" aria-haspopup="true" aria-controls="overlay__hook" aria-expanded="false"> <span class="visually-hidden">Toggle Navigation</span> </button> <div class="navLabel_dt"> <a class="c-nav__logo" href="/" data-event-category="Article" data-event-action="Navigation bar" data-event-label="TNW Logo" name="TNW Logo" data-event-non-interaction="false"> <svg preserveAspectRatio="xMidYMid meet" viewBox="0 0 66 16"> <path d="M32.23993 5A6.00284 6.00284 0 0 1 34 9.24261V16h-6v-5.929a2.00249 2.00249 0 0 0-.58856-1.41424l-2.07239-2.07101A2.00315 2.00315 0 0 0 23.92346 6H22v10h-6V0h8.75189a6 6 0 0 1 4.24268 1.75739zM60 0v5.929a2.00245 2.00245 0 0 1-.58856 1.41418l-2.07385 2.071A1.99969 1.99969 0 0 1 55.9234 10h-2.88214A5.99166 5.99166 0 0 0 54 6.75732V0h-6v5.929a2.00245 2.00245 0 0 1-.58856 1.41418l-2.07385 2.071A1.99969 1.99969 0 0 1 43.9234 10H42V0h-6v16h8.75189a6.003 6.003 0 0 0 4.244-1.75739L51 12.23938V16h5.75189a6.003 6.003 0 0 0 4.244-1.75739l3.244-3.24267A6.00264 6.00264 0 0 0 66 6.75732V0zM0 6h4v10h6V6h4V0H0z"></path> </svg> </a> </div> <div class="c-nav__menuContainer c-nav__menuContainer--1" id="overlay__hook"> <ul class="c-nav__menu"> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" data-event-category="Navigation bar" data-event-action="News" data-event-label="/" data-event-non-interaction="false" href="/" > News </a> </li> <li class="c-nav__menuItem has-menu"> <button class="c-nav__menuLink" type="button" aria-haspopup="true" aria-expanded="false">Events</button> <ul class="c-nav__submenu" role="menu"> <li class="c-nav__submenuItem"> <a class="c-nav__submenuLink" href="/conference" data-event-category="Navigation bar" data-event-action="TNW Conference" data-event-label="/conference" data-event-non-interaction="false" > <span class="c-nav__submenuLinkTitle" data-event-category="Navigation bar" data-event-action="TNW Conference" data-event-label="/conference" data-event-non-interaction="false">TNW Conference</span> <span class="c-nav__submenuLinkNote">June 19 & 20, 2025</span> </a> </li> <li class="c-nav__submenuItem"> <a class="c-nav__submenuLink" href="https://thenextweb.com/conference/the-soonicorn-summit" data-event-category="Navigation bar" data-event-action="The Soonicorn Summit" data-event-label="https://thenextweb.com/conference/the-soonicorn-summit" data-event-non-interaction="false" > <span class="c-nav__submenuLinkTitle" data-event-category="Navigation bar" data-event-action="The Soonicorn Summit" data-event-label="https://thenextweb.com/conference/the-soonicorn-summit" data-event-non-interaction="false">The Soonicorn Summit</span> <span class="c-nav__submenuLinkNote"></span> </a> </li> <li class="c-nav__submenuItem"> <a class="c-nav__submenuLink" href="https://thenextweb.com/conference/tnw-webinar-series" data-event-category="Navigation bar" data-event-action="TNW Webinars" data-event-label="https://thenextweb.com/conference/tnw-webinar-series" data-event-non-interaction="false" > <span class="c-nav__submenuLinkTitle" data-event-category="Navigation bar" data-event-action="TNW Webinars" data-event-label="https://thenextweb.com/conference/tnw-webinar-series" data-event-non-interaction="false">TNW Webinars</span> <span class="c-nav__submenuLinkNote"></span> </a> </li> <li class="c-nav__submenuItem"> <a class="c-nav__submenuLink" href="/events" data-event-category="Navigation bar" data-event-action="All events" data-event-label="/events" data-event-non-interaction="false" > <span class="c-nav__submenuLinkTitle" data-event-category="Navigation bar" data-event-action="All events" data-event-label="/events" data-event-non-interaction="false">All events</span> <span class="c-nav__submenuLinkNote"></span> </a> </li> </ul> </li> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" data-event-category="Navigation bar" data-event-action="Spaces" data-event-label="/spaces" data-event-non-interaction="false" href="/spaces" > Spaces </a> </li> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" data-event-category="Navigation bar" data-event-action="Programs" data-event-label="/programs" data-event-non-interaction="false" href="/programs" > Programs </a> </li> </ul> <hr class="mobile_menu_divider "/> <ul class="c-nav__menu c-nav__icons"> <li class="c-nav__menuItem c-nav__iconsItem"> <a href="/newsletters" class="c-nav__menuLink" data-event-category="Navigation bar" data-event-action="Newsletter" data-event-label="Newsletters top right - click" data-event-non-interaction="false"> <span data-event-category="Navigation bar" data-event-action="Newsletters" data-event-label="/newsletters" data-event-non-interaction="false" class="c-nav__iconsItem--label">Newsletters</span> </a> </li> <li class="c-nav__menuItem c-nav__iconsItem"> <a href="/partnerships" class="c-nav__menuLink"> <span data-event-category="Navigation bar" data-event-action="Partner with us" data-event-label="/partnerships" data-event-non-interaction="false" class="c-nav__iconsItem--label">Partner with us</span> </a> </li> </ul> <footer class="c-nav__footer"> <ul class="c-nav__social"> <li class="c-nav__socialItem"> <a class="c-nav__socialLink" href="https://facebook.com/thenextweb" target="_blank" rel="noopener noreferrer" name="Facebook Social Link"> <svg class="c-nav__socialIcon"><use xlink:href="/assets/next/img/icons.svg#facebook"></use></svg> </a> </li> <li class="c-nav__socialItem"> <a class="c-nav__socialLink" href="https://www.instagram.com/thenextweb" target="_blank" rel="noopener noreferrer" name="Instagram Social Link"> <svg class="c-nav__socialIcon"><use xlink:href="/assets/next/img/icons.svg#instagram"></use></svg> </a> </li> <li class="c-nav__socialItem"> <a class="c-nav__socialLink" href="https://twitter.com/thenextweb" target="_blank" rel="noopener noreferrer" name="Twitter Social Link"> <svg class="c-nav__socialIcon"><use xlink:href="/assets/next/img/icons.svg#twitter"></use></svg> </a> </li> <li class="c-nav__socialItem"> <a class="c-nav__socialLink" href="https://youtube.com/user/thenextweb" target="_blank" rel="noopener noreferrer" name="Youtube Social Link"> <svg class="c-nav__socialIcon"><use xlink:href="/assets/next/img/icons.svg#youtube"></use></svg> </a> </li> <li class="c-nav__socialItem"> <a class="c-nav__socialLink" href="https://flipboard.com/@thenextweb" target="_blank" rel="noopener noreferrer" name="Flipboard Social Link"> <svg class="c-nav__socialIcon"><use xlink:href="/assets/next/img/icons.svg#flipboard"></use></svg> </a> </li> <li class="c-nav__socialItem"> <a class="c-nav__socialLink" href="/newsletters" name="Email Social Link"> <svg class="c-nav__socialIcon"><use xlink:href="/assets/next/img/icons.svg#mail"></use></svg> </a> </li> </ul> <ul class="c-nav__company"> <li class="c-nav__companyItem"> <a class="c-nav__companyLink" href="https://thenextweb.homerun.co/" target="_blank" rel="noopener noreferrer">Jobs</a> </li> <li class="c-nav__companyItem"><a class="c-nav__companyLink" href="mailto:conference@thenextweb.com">Contact</a></li> </ul> </footer> </div> </div> <div class="c-nav__level2 tnw news"> <div class="c-nav__pwd"> <a class="c-nav__pwdLogo" href="/"><svg class="tnwLogo__tnwNews"><title>The Next Web</title><use xlink:href="/assets/next/img/icons.svg#tnw"></use></svg></a> <a class="c-nav__pwdLogoUkraine" href="/ukraine"> <img alt="We stand with Ukraine" src="https://s3.eu-west-1.amazonaws.com/tnw.events/hardfork-2018/uploads/companies/ukraine.png" /> </a> <span class="c-nav__pwdSection">News</span> <a class="c-nav__pwdSite" href="/" title=""> <span class="sm:hidden" id="channelName_abbr">news</span> <span class="max-sm:hidden xl:hidden">news</span> <span class="max-xl:hidden" id="channelName_mob">news</span> </a> </div> <div class="c-nav__menuContainer c-nav__menuContainer--2"> <ul class="c-nav__menu"> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" href="/latest" data-event-category="Navigation bar" data-event-action="Latest" data-event-label="/latest" data-event-non-interaction="false">Latest</a> </li> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" href="/deep-tech" data-event-category="Navigation bar" data-event-action="Deep tech" data-event-label="/deep-tech" data-event-non-interaction="false">Deep tech</a> </li> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" href="/sustainability" data-event-category="Navigation bar" data-event-action="Sustainability" data-event-label="/sustainability" data-event-non-interaction="false">Sustainability</a> </li> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" href="/ecosystems" data-event-category="Navigation bar" data-event-action="Ecosystems" data-event-label="/ecosystems" data-event-non-interaction="false">Ecosystems</a> </li> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" href="/data-security" data-event-category="Navigation bar" data-event-action="Data and security" data-event-label="/data-security" data-event-non-interaction="false">Data and security</a> </li> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" href="/fintech-ecommerce" data-event-category="Navigation bar" data-event-action="Fintech and ecommerce" data-event-label="/fintech-ecommerce" data-event-non-interaction="false">Fintech and ecommerce</a> </li> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" href="/future-of-work" data-event-category="Navigation bar" data-event-action="Future of work" data-event-label="/future-of-work" data-event-non-interaction="false">Future of work</a> </li> <li class="c-nav__menuItem"> <a class="c-nav__menuLink" href="https://podcast.thenextweb.com" data-event-category="Navigation bar" data-event-action="Podcast" data-event-label="https://podcast.thenextweb.com" data-event-non-interaction="false">Podcast</a> </li> <li class="c-nav__menuItem has-menu"> <button class="c-nav__menuLink" type="button" aria-haspopup="true" aria-expanded="false">More</button> <ul class="c-nav__submenu"> <li class="c-nav__submenuItem"> <a class="c-nav__submenuLink" href="https://thenextweb.com/tnw-conference-2024"> <span class="c-nav__submenuLinkTitle" data-event-category="Navigation bar" data-event-action="Conference media hub" data-event-label="https://thenextweb.com/tnw-conference-2024" data-event-non-interaction="false">Conference media hub</span> </a> </li> <li class="c-nav__submenuItem"> <a class="c-nav__submenuLink" href="/startups-technology"> <span class="c-nav__submenuLinkTitle" data-event-category="Navigation bar" data-event-action="Startups and technology" data-event-label="/startups-technology" data-event-non-interaction="false">Startups and technology</span> </a> </li> <li class="c-nav__submenuItem"> <a class="c-nav__submenuLink" href="/investors-funding"> <span class="c-nav__submenuLinkTitle" data-event-category="Navigation bar" data-event-action="Investors and funding" data-event-label="/investors-funding" data-event-non-interaction="false">Investors and funding</span> </a> </li> <li class="c-nav__submenuItem"> <a class="c-nav__submenuLink" href="/government-policy"> <span class="c-nav__submenuLinkTitle" data-event-category="Navigation bar" data-event-action="Government and policy" data-event-label="/government-policy" data-event-non-interaction="false">Government and policy</span> </a> </li> <li class="c-nav__submenuItem"> <a class="c-nav__submenuLink" href="/corporates-innovation"> <span class="c-nav__submenuLinkTitle" data-event-category="Navigation bar" data-event-action="Corporates and innovation" data-event-label="/corporates-innovation" data-event-non-interaction="false">Corporates and innovation</span> </a> </li> <li class="c-nav__submenuItem"> <a class="c-nav__submenuLink" href="/plugged"> <span class="c-nav__submenuLinkTitle" data-event-category="Navigation bar" data-event-action="Gadgets & apps" data-event-label="/plugged" data-event-non-interaction="false">Gadgets & apps</span> </a> </li> </ul> </li> </ul> <button class="c-nav__menuScroller" type="button" aria-hidden="true"></button> </div> </div> </nav> <div class="o-page" id="main"> <div class="o-page__main"> <main class="c-channel c-channel--latest o-page__main" id="article_container"> <div class="c-articles"> <div class="c-articles__backdrop"><div class="c-articles__backdrop--sticky"></div></div> <div class="c-nav__message c-nav__message--article news" style="top:0"> <p>This article was published on <strong>August 29, 2024</strong></p> </div> <header class="c-header"> <div class="o-wrapper"> <div class="c-header__text"> <ul class="c-header__tags c-tags c-tags--centered"> <li class="c-tags__tag"> <a class="c-tags__link c-article-leadtag" data-event-category="Article" data-event-action="Tags" data-event-label="Data and security" data-event-non-interaction="false" href="/data-security">Data and security</a> </li> </ul> <h1 class="c-header__heading"> Quantum computing: the inevitable threat to information security </h1> <p class="c-header__intro" > Op-ed by Amir Vashkover, head of Philips Data Security and board advisor to Quantum Knight </p> <br/> <div> <time datetime="August 29, 2024 - 12:37 pm">August 29, 2024 - 12:37 pm</time> </div> </div> <div aria-hidden="true" class="c-share lg:hidden"> <a class="c-share__link c-share__link--facebook" rel="noopener" target="_blank" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="http://www.facebook.com/sharer/sharer.php?s=100&p[url]=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dfacebook%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button&p[title]=Quantum%20computing%3A%20the%20inevitable%20threat%20to%20information%20security&p[images][0]=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&u=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable&t=Quantum%20computing%3A%20the%20inevitable%20threat%20to%20information%20security" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#facebook"></use></svg> </a> <a class="c-share__link c-share__link--twitter" rel="noopener" target="_blank" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="https://twitter.com/intent/tweet?url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dtwitter%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button%26referral&via=thenextweb&related=thenextweb&text=Quantum%20computing%3A%20the%20inevitable%20threat%20to%20information%20security" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#twitter"></use></svg> </a> <a class="c-share__link c-share__link--flipboard" rel="noopener" target="_blank" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="https://share.flipboard.com/bookmarklet/popout?url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dflipboard%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#flipboard"></use></svg> </a> <a class="c-share__link c-share__link--linkedin" rel="noopener" target="_blank" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=500,height=500'); return false;" href="https://www.linkedin.com/shareArticle/?mini=true&url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dlinkedin%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#linkedin"></use></svg> </a> <a class="c-share__link c-share__link--telegram" rel="noopener" target="_blank" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="https://t.me/share/url?url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dtelegram%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#telegram"></use></svg> </a> <a class="c-share__link c-share__link--mail" href="mailto:?subject=Quantum computing: the inevitable threat to information security&body=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Demail%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#mail"></use></svg> </a> </div> </div> </header> <div class="e-empty__hidden"></div> <div class="screen-size desktop-screen"> <style scoped>#tnw-next-header{height:250px;}@media(min-width:768px){#tnw-next-header{height:250px;}@media(min-width:1024px){#tnw-next-header{height:250px;}</style><div class="tnw-ad tnw-ad--billboard tnw-ad--has-placeholder" id="tnw-next-header" data-args='{"networkCode":5117602,"slot":"TNW_NEXT_HEADER","googletagAttempts":20,"animate":false,"fallback":false,"sizes":[[320,240],[300,250],[970,250],[970,90],[728,90],[320,50],[300,100],[300,50],[320,100]],"sizeMapping":[[[1024,0],[[970,250],[970,90],[728,90]]],[[0,0],[[300,250],[320,50],[300,50],[300,100],[320,100],[320,240]]]],"targeting":{"postID":["1409776"],"title":["Quantum computing: the inevitable threat to information security"],"category":["data-security"],"isSponsored":["No"]},"lazyLoad":"true","refreshEvery":"","debugMode":false}'></div> </div> <script> document.getElementsByClassName('tnw-ad-wrapper')[0]?.classList.add('ad-wrapper__growth-quarters'); </script> <div class="o-wrapper mb-4xl" > <article class="c-article js-article mt-m" id="articleOutput" style="margin-top: 0px;" > <div class="c-article__media c-article__growth-mobile"> <figure class="o-media o-media--16:9"> <img alt="Quantum computing: the inevitable threat to information security" class="js-lazy c-article__mediaImage w-full absolute top-0" sizes="(max-width: 1023px) 100vw 868px" data-src="https://img-cdn.tnwcdn.com/image?fit=1280%2C720&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=e85756c3fd1e06f33851117b59bcaa09" data-srcset="https://img-cdn.tnwcdn.com/image?fit=576%2C324&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=a630528467b03700f2c061c7af211aec 576w, https://img-cdn.tnwcdn.com/image?fit=1152%2C648&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=0279549fad4f556600d269e686f4c508 1152w, https://img-cdn.tnwcdn.com/image?fit=1280%2C720&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=e85756c3fd1e06f33851117b59bcaa09 1280w" > <noscript> <img alt="Quantum computing: the inevitable threat to information security" class="c-article__mediaImage w-full absolute top-0" src="https://img-cdn.tnwcdn.com/image?fit=1280%2C720&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=e85756c3fd1e06f33851117b59bcaa09" sizes="(max-width: 1023px) 100vw 868px" srcset="https://img-cdn.tnwcdn.com/image?fit=576%2C324&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=a630528467b03700f2c061c7af211aec 576w, https://img-cdn.tnwcdn.com/image?fit=1152%2C648&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=0279549fad4f556600d269e686f4c508 1152w, https://img-cdn.tnwcdn.com/image?fit=1280%2C720&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&signature=e85756c3fd1e06f33851117b59bcaa09 1280w" > </noscript> </figure> </div> <div class="screen-size mobile-screen" style="text-align: center"></div> <script> document.getElementsByClassName('tnw-ad-wrapper')[1]?.classList?.add('ad-wrapper__growth-quarters'); </script> <div class="c-article__main max-lg:mb-xxl"> <div class="c-richText c-richText--large" id="article-main-content"> <p><span style="font-weight: 400;">In an era where technological advancements continually reshape our world, one of the most significant emerging threats is </span><a href="https://thenextweb.com/topic/quantum-computers" target="_blank" rel="noopener"><span style="font-weight: 400;">quantum computing</span></a><span style="font-weight: 400;">. </span></p> <p><span style="font-weight: 400;">This powerful technology, while promising revolutionary benefits, poses a substantial risk to our current </span><a href="https://thenextweb.com/topic/cybersecurity" target="_blank" rel="noopener"><span style="font-weight: 400;">cybersecurity</span></a><span style="font-weight: 400;"> infrastructure. As we stand on the brink of this quantum revolution, it is imperative to understand the potential dangers and prepare accordingly.</span></p> <h2><strong>The quantum leap</strong> <span style="font-weight: 400;"> </span></h2> <p><span style="font-weight: 400;">Quantum computing harnesses the principles of quantum mechanics to perform computations at speeds unimaginable with classical computers. In 2019, Google proclaimed to have demonstrated “quantum supremacy” when its Sycamore processor solved a problem in 200 seconds that would take the most advanced classical supercomputers nearly 10,000 years. </span></p> <p><span style="font-weight: 400;">While the specific feat was disputed, there is no denying that quantum computing has made tremendous strides toward computation capabilities that are far beyond today’s fastest HPC systems. More recent progress signals the approaching reality of quantum computers capable of breaking existing encryption methods. </span></p> <h2><strong>The quantum threat</strong></h2> <div class="inarticle-wrapper latest channel-cta hs-embed-tnw"><div id="hs-embed-tnw" class="channel-cta-wrapper"><div class="channel-cta-img"><img class="js-lazy" src="https://s3.eu-west-1.amazonaws.com/tnw.events/hardfork-2018/uploads/visuals/tnw-newsletter.png"></div><noscript><img src="https://s3.eu-west-1.amazonaws.com/tnw.events/hardfork-2018/uploads/visuals/tnw-newsletter.png"></noscript><div class="channel-cta-input"><p class="channel-cta-title">The 💜 of EU tech</p><p class="channel-cta-tagline">The latest rumblings from the EU tech scene, a story from our wise ol' founder Boris, and some questionable AI art. It's free, every week, in your inbox. Sign up now!</p><div id="hs-inarticle-embed"><div id="latest-inarticle-embed"></div></div></div></div></div><p><span style="font-weight: 400;">Current encryption methods, which protect everything from personal </span><a href="https://thenextweb.com/topic/data" target="_blank" rel="noopener"><span style="font-weight: 400;">data</span></a><span style="font-weight: 400;"> to national security information, rely on the difficulty of solving mathematical problems that classical computers cannot handle efficiently. Quantum computers, however, can solve these problems exponentially faster, rendering traditional encryption obsolete. The risks include:</span></p> <ul> <li style="font-weight: 400;" aria-level="1"><b>Data Interception and Misuse</b><span style="font-weight: 400;">: All encrypted data could be at risk of interception and decryption by quantum computers.</span></li> <li style="font-weight: 400;" aria-level="1"><b>“Harvest Now, Decrypt Later” Attacks</b><span style="font-weight: 400;">: Malicious actors might collect encrypted data now with the intention of decrypting it once quantum computers become available.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Compromise of Critical Systems</b><span style="font-weight: 400;">: Failure to migrate to quantum-safe algorithms could lead to breaches in critical business and functional systems, affecting industries like healthcare, finance, and government.</span></li> </ul> <p><span style="font-weight: 400;">In August 2021, the US National Security Agency (NSA) </span><a href="https://www.grandviewresearch.com/industry-analysis/quantum-cryptography-market-report" target="_blank" rel="nofollow noopener"><span style="font-weight: 400;">announced that</span></a><span style="font-weight: 400;"> “adversarial use of a quantum computer could have devastating effects on National Security Systems and the nation as a whole. The enhanced security measures employed by quantum cryptography make it virtually difficult to breach and tackle this situation, offering a level of protection that far exceeds traditional encryption methods, driving the market growth.” </span></p> <h2><span style="font-weight: 400;"><strong>Who should be concerned?</strong> </span></h2> <p><span style="font-weight: 400;">Organizations handling confidential data with long-term confidentiality needs, such as personal identifiable information (PII), personal health information (PHI), legal documents, and intellectual property, are at significant risk. Additionally, organizations providing systems with long lifespans, such as medical devices, and suppliers to critical industries must prioritize preparing for quantum threats.</span></p> <h3><span style="font-weight: 400;"><strong>Preparing for the quantum era</strong> </span></h3> <p><span style="font-weight: 400;">The question is not if quantum computers will break current encryption, but when. Predictions vary, with some experts estimating significant impacts within the next decade. For example, </span><a href="https://www2.deloitte.com/us/en/insights/topics/cyber-risk/crypto-agility-quantum-computing-security.html" target="_blank" rel="nofollow noopener"><span style="font-weight: 400;">Deloitte suggests</span></a><span style="font-weight: 400;"> serious quantum threats could emerge within ten years, while </span><a href="https://www.forrester.com/report/the-state-of-quantum-security/RES181112" target="_blank" rel="nofollow noopener"><span style="font-weight: 400;">Forrester forecasts</span></a><span style="font-weight: 400;"> a 50% to 70% chance within five years.</span></p> <h3><strong>Steps to mitigation</strong></h3> <p><span style="font-weight: 400;">To mitigate these impending threats, organizations must adopt a proactive approach:</span></p> <ol> <li style="font-weight: 400;" aria-level="1"><b>Understand Business Contexts and Objectives</b><span style="font-weight: 400;">: Recognize how quantum threats impact specific business operations and data.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Identify Quantum Threats</b><span style="font-weight: 400;">: Assess which aspects of the business are most vulnerable to quantum attacks.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Define Target Maturity</b><span style="font-weight: 400;">: Set goals for achieving quantum-safe security measures.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Assess Current Capabilities</b><span style="font-weight: 400;">: Evaluate existing security measures against future quantum threats.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Focus on Priorities</b><span style="font-weight: 400;">: Prioritize areas that need immediate attention to enhance quantum resilience.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Develop a Quantum Security Roadmap</b><span style="font-weight: 400;">: Create a detailed plan for transitioning to quantum-safe cryptography algorithms.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Show Value from Investments</b><span style="font-weight: 400;">: Communicate the importance and benefits of quantum security investments to stakeholders.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Raise Awareness</b><span style="font-weight: 400;">: Educate all levels of the organization about the quantum threat and necessary precautions.</span></li> </ol> <h2><strong>Post Quantum Cryptography (PQC) initiatives</strong></h2> <p><span style="font-weight: 400;">Post Quantum Cryptography (PQC) is a current top national security priority for most governments. </span><a href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank" rel="nofollow noopener"><span style="font-weight: 400;">NIST</span></a><span style="font-weight: 400;"> has been struggling with figuring out the next gen FIPS 140.3 (512 bit) regulatory PQC standards, with the very first release starting in August 2024. Of which, Quantum Knight is within the first group of FIPS 140.3 module validations.</span></p> <p><span style="font-weight: 400;">These new NIST PQC algorithms are raw ciphers only, not a cryptographic system like CLEAR. After their release on August 13, these NIST algorithms will now have to be made useful and implemented over the next 3-10 years across the entire data ecosystem mentioned above.</span></p> <p><span style="font-weight: 400;">Google, Apple, IBM, and others have started upgrading the cryptography within their systems and services and started industry consortiums to begin to discuss and learn how they can implement and make these new algorithms useful for their customers. These efforts only attempt to upgrade their current broken distributed data ecosystem (i.e. the hops/jumps/pass-thrus).</span></p> <h2><span style="font-weight: 400;"><strong>The road ahead</strong> </span></h2> <p><span style="font-weight: 400;">Transitioning to quantum-safe algorithms is not a straightforward process. It involves:</span></p> <ul> <li style="font-weight: 400;" aria-level="1"><b>Collaboration</b><span style="font-weight: 400;">: Working with academia, industry, and governments to develop and standardize quantum-resistant algorithms.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Resource Allocation</b><span style="font-weight: 400;">: Investing wisely in quantum security technologies and processes.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Education</b><span style="font-weight: 400;">: Ensuring stakeholders understand the risks and necessary measures using clear and common terms.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Comprehensive Approach</b><span style="font-weight: 400;">: Beyond algorithms, reevaluating protocols, standards, and hardware components to ensure holistic security.</span></li> </ul> <p><span style="font-weight: 400;">Despite these advancements, the real challenge lies in the implementation and integration of quantum cryptographic solutions. </span></p> <p><span style="font-weight: 400;">Many companies struggle to transition from theoretical models to practical applications, resulting in a gap between promise and performance. This is where pioneering startups such as <a href="https://www.quantumknight.io/" target="_blank" rel="nofollow noopener">Quantum Knight</a> come in, providing robust and reliable solutions that not only meet but exceed industry standards.</span></p> <h2><strong>Conclusion</strong></h2> <p><span style="font-weight: 400;">The advent of quantum computing is a double-edged sword, offering unparalleled computational power while threatening to undermine our current cybersecurity frameworks. Organizations must act now, understanding the threat, preparing for the inevitable, and transitioning to quantum-safe practices. </span></p> <p><span style="font-weight: 400;">While the timeline remains uncertain, the proactive steps taken today will safeguard the future against the quantum threat.</span></p> <p><i><span style="font-weight: 400;"><a href="https://www.linkedin.com/in/amir-vashkover/" target="_blank" rel="nofollow noopener">Amir Vashkover</a> is a seasoned technology leader with vast experience in both operational and leadership roles within the field of Cybersecurity. He currently leads Philips’ Data Security division and is a board advisor at post-quantum encryption provider Quantum Knight. Before that, Amir held leadership positions across multiple industries, including roles as CISO, VP of Business development and Product management. He holds a university degree in Electrical & Computer engineering, and an MBA from leading universities in Israel.</span></i></p> </div> <aside class="c-contributor latest"> <a href="/author/amirvashkover" target="_blank" rel="noopener" data-event-category="Article" data-event-action="Author" data-event-label="Amir Vashkover" data-event-non-interaction="false" > <img alt="Amir Vashkover" class="c-contributor__photo js-lazy" data-src="https://img-cdn.tnwcdn.com/image/duotone?fit=240%2C240&gradient=%23660099-%2300CCAA&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F08%2FScreenshot-2024-08-29-at-14.04.16.png&signature=9a36b05ff7f3dfd25ba3d79d4bd02d40" > <noscript> <img alt="Amir Vashkover" class="c-contributor__photo" src="https://img-cdn.tnwcdn.com/image/duotone?fit=240%2C240&gradient=%23660099-%2300CCAA&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F08%2FScreenshot-2024-08-29-at-14.04.16.png&signature=9a36b05ff7f3dfd25ba3d79d4bd02d40" > </noscript> </a> <div aria-label="Author Bio" class="c-contributor__main"> <h2 class="c-contributor__wrapper"> <span class="c-contributor__heading"> Story by </span> <span class="c-contributor__name" > <a href="/author/amirvashkover" class="latest"> Amir Vashkover </a> </span> </h2> <p class="c-contributor__text"> <input class="c-contributor__expandInput" id="contributorExpandInput123" name="expand" type="checkbox"> <span class="c-contributor__bio c-contributor__bio--truncated"> Amir Vashkover is a seasoned technology leader with vast experience in both operational and leadership roles within the field of Cybersecuri <label class="c-contributor__expand data-security" for="contributorExpandInput123"> (show all) </label> </span> <span class="c-contributor__bio c-contributor__bio--full"> Amir Vashkover is a seasoned technology leader with vast experience in both operational and leadership roles within the field of Cybersecurity. He currently leads Philips’ Data Security division and is a board advisor at post-quantum encryption provider Quantum Knight. Before that, Amir held leadership positions across multiple industries, including roles as CISO, VP of Business development and Product management. He holds a university degree in Electrical & Computer engineering, and an MBA from leading universities in Israel. </span> </p> </div> </aside> <div class="c-channel__cta" id='nl-container'> <h2 class="c-channel__ctaHeading text-dark">Get the TNW newsletter</h2> <p class="c-channel__ctaDescription text-white">Get the most important tech news in your inbox each week.</p> <div id='in-article-newsletter' style="color: #fff"></div> </div> <h2 class="alsoTaggedIn">Also tagged with</h2> <br> <ul class="c-header__tags c-tags c-tags--left"> <li class="c-tags__tag"> <a class="c-tags__link c-article-leadtag" data-event-category="Article" data-event-action="Tags" data-event-label="Security" data-event-non-interaction="false" href="/topic/security" >Security</a> </li> </ul> <footer class="c-article__pubDate md:flex md:justify-between"> <div> Published <time datetime="2019-02-11 12:07:00">August 29, 2024 - 12:37 pm UTC</time> </div> <a href="#" data-event-category="Article" data-event-action="Back to top" data-event-label="Back to top - click" data-event-non-interaction="true" class="scrolly latest" data-target="#next-top" >Back to top</a> </footer> <div aria-label="Social share options" class="c-share lg:hidden"> <a aria-label="Share on Facebook" class="c-share__link c-share__link--facebook" rel="noopener" target="_blank" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="http://www.facebook.com/sharer/sharer.php?s=100&p[url]=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dfacebook%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button&p[title]=Quantum%20computing%3A%20the%20inevitable%20threat%20to%20information%20security&p[images][0]=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&u=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable&t=Quantum%20computing%3A%20the%20inevitable%20threat%20to%20information%20security" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#facebook"></use></svg> </a> <a aria-label="Share on Twitter" class="c-share__link c-share__link--twitter" rel="noopener" target="_blank" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="https://twitter.com/intent/tweet?url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dtwitter%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button%26referral&via=thenextweb&related=thenextweb&text=Quantum%20computing%3A%20the%20inevitable%20threat%20to%20information%20security" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#twitter"></use></svg> </a> <a aria-label="Share on Flipboard" class="c-share__link c-share__link--flipboard" rel="noopener" target="_blank" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="https://share.flipboard.com/bookmarklet/popout?url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dflipboard%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#flipboard"></use></svg> </a> <a aria-label="Share on Linkedin" class="c-share__link c-share__link--linkedin" rel="noopener" target="_blank" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=500,height=500'); return false;" href="https://www.linkedin.com/shareArticle/?mini=true&url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dlinkedin%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#linkedin"></use></svg> </a> <a aria-label="Share on Telegram" class="c-share__link c-share__link--telegram" rel="noopener" target="_blank" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="https://t.me/share/url?url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dtelegram%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#telegram"></use></svg> </a> <a aria-label="Share via Email" class="c-share__link c-share__link--mail" href="mailto:?subject=Quantum computing: the inevitable threat to information security&body=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Demail%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-share__icon" style="fill: #fff"><use xlink:href="/assets/next/img/icons.svg#mail"></use></svg> </a> </div> </div> <aside aria-hidden="true" class="c-article__side"> <aside class="c-article__author"> <a href="/author/amirvashkover" class="data-security" data-event-category="Article" data-event-action="Author" data-event-label="Amir Vashkover" data-event-non-interaction="false" > <img alt="Amir Vashkover" id="duotone" width="96" height="96" class="c-article__authorImage blend-blue-dark js-lazy" data-src="https://img-cdn.tnwcdn.com/image/duotone?fit=240%2C240&gradient=%23660099-%2300CCAA&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F08%2FScreenshot-2024-08-29-at-14.04.16.png&signature=9a36b05ff7f3dfd25ba3d79d4bd02d40" > <noscript> <img alt="Amir Vashkover" id="duotone" width="96" height="96" class="c-article__authorImage blend-blue-dark" src="https://img-cdn.tnwcdn.com/image/duotone?fit=240%2C240&gradient=%23660099-%2300CCAA&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F08%2FScreenshot-2024-08-29-at-14.04.16.png&signature=9a36b05ff7f3dfd25ba3d79d4bd02d40" > </noscript> <span class="c-article__authorHeading">Story by</span> <span class="c-article__authorName latest" >Amir Vashkover</span> </a> </aside> <div class="c-engage"> <a class="c-engage__link" rel="noopener" target="_blank" data-event-category="Article" data-event-action="Share" data-event-label="Facebook" data-event-non-interaction="false" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="http://www.facebook.com/sharer/sharer.php?s=100&p[url]=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dfacebook%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button&p[title]=Quantum%20computing%3A%20the%20inevitable%20threat%20to%20information%20security&p[images][0]=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F06%2Fquantum-computer-e1718827535583.jpg&u=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable&t=Quantum%20computing%3A%20the%20inevitable%20threat%20to%20information%20security" > <svg class="c-engage__icon"><use xlink:href="/assets/next/img/icons.svg#facebook"></use></svg> </a> <a class="c-engage__link" rel="noopener" target="_blank" data-event-category="Article" data-event-action="Share" data-event-label="Twitter" data-event-non-interaction="false" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="https://twitter.com/intent/tweet?url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dtwitter%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button%26referral&via=thenextweb&related=thenextweb&text=Quantum%20computing%3A%20the%20inevitable%20threat%20to%20information%20security" > <svg class="c-engage__icon"><use xlink:href="/assets/next/img/icons.svg#twitter"></use></svg> </a> <a class="c-engage__link" rel="noopener" target="_blank" data-event-category="Article" data-event-action="Share" data-event-label="Linkedin" data-event-non-interaction="false" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=500,height=500'); return false;" href="https://www.linkedin.com/shareArticle/?mini=true&url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dlinkedin%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-engage__icon"><use xlink:href="/assets/next/img/icons.svg#linkedin"></use></svg> </a> <a class="c-engage__link" rel="noopener" target="_blank" data-event-category="Article" data-event-action="Share" data-event-label="Flipboard" data-event-non-interaction="false" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="https://share.flipboard.com/bookmarklet/popout?url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dflipboard%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-engage__icon"><use xlink:href="/assets/next/img/icons.svg#flipboard"></use></svg> </a> <a class="c-engage__link" rel="noopener" target="_blank" data-event-category="Article" data-event-action="Share" data-event-label="Telegram" data-event-non-interaction="false" onClick="window.open(this.href,'targetWindow','toolbar=no,location=0,status=no,menubar=no,scrollbars=yes,resizable=yes,width=600,height=250'); return false;" href="https://t.me/share/url?url=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Dtelegram%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-engage__icon"><use xlink:href="/assets/next/img/icons.svg#telegram"></use></svg> </a> <a class="c-engage__link" data-event-category="Article" data-event-action="Share" data-event-label="Email" data-event-non-interaction="false" href="mailto:?subject=Quantum computing: the inevitable threat to information security&body=https://thenextweb.com/news/quantum-computing-threat-information-security-inevitable%3Futm_source%3Demail%26utm_medium%3Dshare%26utm_campaign%3Darticle-share-button" > <svg class="c-engage__icon"><use xlink:href="/assets/next/img/icons.svg#mail"></use></svg> </a> </div> </aside> <aside class="c-split__side mb-m" id="sidebar"> <div class="c-split__sticky "> <div class="tnw-ad tnw-ad--article-mpu" id="tnw-next-mpu-atf" data-args='{"networkCode":5117602,"slot":"TNW_NEXT_MPU_ATF","googletagAttempts":20,"animate":false,"fallback":false,"sizes":[[300,50],[300,250],[300,600]],"sizeMapping":[],"targeting":{"postID":["1409776"],"title":["Quantum computing: the inevitable threat to information security"],"category":["data-security"],"isSponsored":["No"],"nsc":["false"]},"lazyLoad":"false","refreshEvery":"","debugMode":false}'></div> <div id='sidebarJobbio' class='jobbioapp sticky top-4xl'></div> <div class="tnw-ad tnw-ad--article-mpu-btf" id="tnw-next-mpu-btf" data-args='{"networkCode":5117602,"slot":"TNW_NEXT_MPU_BTF","googletagAttempts":20,"animate":false,"fallback":false,"sizes":[[300,250],[300,600]],"sizeMapping":[],"targeting":{"postID":["1409776"],"title":["Quantum computing: the inevitable threat to information security"],"category":["data-security"],"isSponsored":["No"],"nsc":["false"]},"lazyLoad":"false","refreshEvery":"","debugMode":false}'></div> </div> </aside> </article> </div> </div> <aside aria-label="Related Articles" class="c-article__suggested"> <div class="c-nextRelatedGrid"> <section class="o-wrapper o-wrapper--wide"> <header class="c-bodyNews__header"> <h2 class="c-bodyNews__heading">Related Articles</h2> </header> <div class="c-showcase__grid"> <section class="c-showcase__grid c-showcase__scroller js-parallaxRoot"> <article class="c-showcase__article"> <div class="c-card c-card--visual"> <a class="c-card__image js-parallax o-media md:o-media--stretch relcon_link_fix" data-event-non-interaction="false" href="/news/spanish-island-builds-giant-water-battery-to-boost-energy-security" > <img class="c-card__imageImage js-parallaxLayer o-parallax__layer js-lazy" data-src="https://img-cdn.tnwcdn.com/image?fit=2361%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=c73dcab2307c75b61f15c62a48b79b40" data-srcset=" https://img-cdn.tnwcdn.com/image?fit=819%2C655&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=663425215bf333eaabd131af0af9d892 819w , https://img-cdn.tnwcdn.com/image?fit=1638%2C1310&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=30c62dc051bb5c823ed798233220475a 1638w , https://img-cdn.tnwcdn.com/image?fit=2457%2C1965&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=9efc61a7bc2615bebaf5e7ae86d1620c 2457w , https://img-cdn.tnwcdn.com/image?fit=660%2C404&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=643de38e6b86dab610689c30e65d8710 660w , https://img-cdn.tnwcdn.com/image?fit=1320%2C808&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=444642efc79e7fc07b11e1738abb95db 1320w , https://img-cdn.tnwcdn.com/image?fit=1980%2C1212&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=2e5bcc3964da3e5540e2bd77d66fc9a6 1980w , https://img-cdn.tnwcdn.com/image?fit=922%2C404&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=3420059fcc0f73425215ca006b0111a8 922w , https://img-cdn.tnwcdn.com/image?fit=1844%2C808&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=96eda88e63b28acfdc01aca6e1209fa5 1844w , https://img-cdn.tnwcdn.com/image?fit=2766%2C1212&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=032b0caf59d108b103a52ea639342502 2766w , https://img-cdn.tnwcdn.com/image?fit=490%2C387&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=5d887a4bfb216ff266c13815031f1416 490w , https://img-cdn.tnwcdn.com/image?fit=980%2C774&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=151af5b568bb5c18d71d6862858ac639 980w , https://img-cdn.tnwcdn.com/image?fit=1470%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=7d7069e3ba1a7788132e77bc40639655 1470w , https://img-cdn.tnwcdn.com/image?fit=787%2C387&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=8a88f1f454785a27f8d86515c746ecd0 787w , https://img-cdn.tnwcdn.com/image?fit=1574%2C774&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=c9b781d4968e0772e71d64fa7202a1db 1574w , https://img-cdn.tnwcdn.com/image?fit=2361%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=c73dcab2307c75b61f15c62a48b79b40 2361w " sizes="(max-width:767px) 819px, (width: 768px) 660px, (min-width:768px) and (max-width:1023px) 922px, (width: 1024px) 490px, 787px" alt="Spanish island builds ‘giant water battery&#8217; to boost energy security" /> <noscript> <img class="c-card__imageImage js-parallaxLayer o-parallax__layer" src="https://img-cdn.tnwcdn.com/image?fit=2361%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=c73dcab2307c75b61f15c62a48b79b40" srcset=" https://img-cdn.tnwcdn.com/image?fit=819%2C655&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=663425215bf333eaabd131af0af9d892 819w , https://img-cdn.tnwcdn.com/image?fit=1638%2C1310&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=30c62dc051bb5c823ed798233220475a 1638w , https://img-cdn.tnwcdn.com/image?fit=2457%2C1965&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=9efc61a7bc2615bebaf5e7ae86d1620c 2457w , https://img-cdn.tnwcdn.com/image?fit=660%2C404&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=643de38e6b86dab610689c30e65d8710 660w , https://img-cdn.tnwcdn.com/image?fit=1320%2C808&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=444642efc79e7fc07b11e1738abb95db 1320w , https://img-cdn.tnwcdn.com/image?fit=1980%2C1212&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=2e5bcc3964da3e5540e2bd77d66fc9a6 1980w , https://img-cdn.tnwcdn.com/image?fit=922%2C404&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=3420059fcc0f73425215ca006b0111a8 922w , https://img-cdn.tnwcdn.com/image?fit=1844%2C808&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=96eda88e63b28acfdc01aca6e1209fa5 1844w , https://img-cdn.tnwcdn.com/image?fit=2766%2C1212&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=032b0caf59d108b103a52ea639342502 2766w , https://img-cdn.tnwcdn.com/image?fit=490%2C387&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=5d887a4bfb216ff266c13815031f1416 490w , https://img-cdn.tnwcdn.com/image?fit=980%2C774&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=151af5b568bb5c18d71d6862858ac639 980w , https://img-cdn.tnwcdn.com/image?fit=1470%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=7d7069e3ba1a7788132e77bc40639655 1470w , https://img-cdn.tnwcdn.com/image?fit=787%2C387&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=8a88f1f454785a27f8d86515c746ecd0 787w , https://img-cdn.tnwcdn.com/image?fit=1574%2C774&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=c9b781d4968e0772e71d64fa7202a1db 1574w , https://img-cdn.tnwcdn.com/image?fit=2361%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F05%2Fpumped-hydro-canary-islands-gran-canaria-energy-europe.jpg&signature=c73dcab2307c75b61f15c62a48b79b40 2361w " sizes="(max-width:767px) 819px, (width: 768px) 660px, (min-width:768px) and (max-width:1023px) 922px, (width: 1024px) 490px, 787px" alt="Spanish island builds ‘giant water battery’ to boost energy security" /> </noscript> </a> <header class="c-card__header"> <span class="c-card__label"> sustainability </span> <h3 class="c-card__heading"> <a href="/news/spanish-island-builds-giant-water-battery-to-boost-energy-security" tabindex="-1">Spanish island builds ‘giant water battery’ to boost energy security</a> </h3> </header> </div> </article> <article class="c-showcase__article"> <div class="c-card c-card--visual"> <a class="c-card__image js-parallax o-media md:o-media--stretch relcon_link_fix" data-event-non-interaction="false" href="/news/russian-cyberattack-eu-parliament-shows-need-for-better-public-sector-security" > <img class="c-card__imageImage js-parallaxLayer o-parallax__layer js-lazy" data-src="https://img-cdn.tnwcdn.com/image?fit=1167%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=12746c35ad6d30b37a7adbba56e87cc9" data-srcset=" https://img-cdn.tnwcdn.com/image?fit=819%2C655&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=4985ce41815d7a45c902f61a6fdb1085 819w , https://img-cdn.tnwcdn.com/image?fit=1638%2C1310&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=a3947557deb8f3a869751e50643d29c2 1638w , https://img-cdn.tnwcdn.com/image?fit=2457%2C1965&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=e68187dc43fb6fbc9178d68be4324a79 2457w , https://img-cdn.tnwcdn.com/image?fit=326%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=bd38ffab9c94aaf18c6fcf1c8d015567 326w , https://img-cdn.tnwcdn.com/image?fit=652%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=e2791ece14399bc40af69428b01394e1 652w , https://img-cdn.tnwcdn.com/image?fit=978%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=0314eb15892180b8d989e433cf2e6eab 978w , https://img-cdn.tnwcdn.com/image?fit=457%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=7812aea757236f9a64bdea7112f570f4 457w , https://img-cdn.tnwcdn.com/image?fit=914%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=34a560b6085c4c42ed1a874118517224 914w , https://img-cdn.tnwcdn.com/image?fit=1371%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=cdc581568116dff263499d6c63bc6e4d 1371w , https://img-cdn.tnwcdn.com/image?fit=241%2C255&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=3e77480a06f586a0e9a27ff11d370c81 241w , https://img-cdn.tnwcdn.com/image?fit=482%2C510&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=4073787a1067570d621e3f194d44e343 482w , https://img-cdn.tnwcdn.com/image?fit=723%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=aa05c6860f9bc237d7a95749702fa0f2 723w , https://img-cdn.tnwcdn.com/image?fit=389%2C255&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=f23230f966400d73de544ad11a910666 389w , https://img-cdn.tnwcdn.com/image?fit=778%2C510&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=bdeb3a87666c1a6e8d26594224c66a92 778w , https://img-cdn.tnwcdn.com/image?fit=1167%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=12746c35ad6d30b37a7adbba56e87cc9 1167w " sizes="(max-width:767px) 819px, (width: 768px) 326px, (min-width:768px) and (max-width:1023px) 457px, (width: 1024px) 241px, 389px" alt="Russian cyberattack on the EU Parliament signals the need for better public sector security" /> <noscript> <img class="c-card__imageImage js-parallaxLayer o-parallax__layer" src="https://img-cdn.tnwcdn.com/image?fit=1167%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=12746c35ad6d30b37a7adbba56e87cc9" srcset=" https://img-cdn.tnwcdn.com/image?fit=819%2C655&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=4985ce41815d7a45c902f61a6fdb1085 819w , https://img-cdn.tnwcdn.com/image?fit=1638%2C1310&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=a3947557deb8f3a869751e50643d29c2 1638w , https://img-cdn.tnwcdn.com/image?fit=2457%2C1965&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=e68187dc43fb6fbc9178d68be4324a79 2457w , https://img-cdn.tnwcdn.com/image?fit=326%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=bd38ffab9c94aaf18c6fcf1c8d015567 326w , https://img-cdn.tnwcdn.com/image?fit=652%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=e2791ece14399bc40af69428b01394e1 652w , https://img-cdn.tnwcdn.com/image?fit=978%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=0314eb15892180b8d989e433cf2e6eab 978w , https://img-cdn.tnwcdn.com/image?fit=457%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=7812aea757236f9a64bdea7112f570f4 457w , https://img-cdn.tnwcdn.com/image?fit=914%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=34a560b6085c4c42ed1a874118517224 914w , https://img-cdn.tnwcdn.com/image?fit=1371%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=cdc581568116dff263499d6c63bc6e4d 1371w , https://img-cdn.tnwcdn.com/image?fit=241%2C255&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=3e77480a06f586a0e9a27ff11d370c81 241w , https://img-cdn.tnwcdn.com/image?fit=482%2C510&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=4073787a1067570d621e3f194d44e343 482w , https://img-cdn.tnwcdn.com/image?fit=723%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=aa05c6860f9bc237d7a95749702fa0f2 723w , https://img-cdn.tnwcdn.com/image?fit=389%2C255&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=f23230f966400d73de544ad11a910666 389w , https://img-cdn.tnwcdn.com/image?fit=778%2C510&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=bdeb3a87666c1a6e8d26594224c66a92 778w , https://img-cdn.tnwcdn.com/image?fit=1167%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2022%2F11%2FEU-attack-.jpg&signature=12746c35ad6d30b37a7adbba56e87cc9 1167w " sizes="(max-width:767px) 819px, (width: 768px) 326px, (min-width:768px) and (max-width:1023px) 457px, (width: 1024px) 241px, 389px" alt="Russian cyberattack on the EU Parliament signals the need for better public sector security" /> </noscript> </a> <header class="c-card__header"> <span class="c-card__label"> tech </span> <h3 class="c-card__heading"> <a href="/news/russian-cyberattack-eu-parliament-shows-need-for-better-public-sector-security" tabindex="-1">Russian cyberattack on the EU Parliament signals the need for better public sector security</a> </h3> </header> </div> </article> <article class="c-showcase__article"> <div class="c-card c-card--visual"> <a class="c-card__image js-parallax o-media md:o-media--stretch" href="https://thenextweb.com/conference" tabindex="-1" > <img class="c-card__imageImage js-parallaxLayer o-parallax__layer" src="https://img-cdn.tnwcdn.com/image?fit=684%2C248&url=https%3A%2F%2Fs3.eu-west-1.amazonaws.com%2Ftnw.events%2Fhardfork-2018%2Fuploads%2Fvisuals%2FConference-Nebula.png&signature=1bb74f9f4b26d485f2fe5f2b8add03f8" alt="Discover TNW All Access" /> </a> <header class="c-card__header advertPane"> <h3 class="ad-title">Discover TNW All Access</h3> <span class="ad-description">Watch videos of our inspiring Talks for free</span> <a class="c-button adpanel c-button--rounded" data-event-category="Article" data-event-action="Related articles Static Advert" data-event-label="Article" data-event-non-interaction="false" href="https://thenextweb.com/auth/tnw/login-required" target="_blank" rel="noopener noreferrer" > Sign up now </a> </header> </div> </article> <article class="c-showcase__article"> <div class="c-card c-card--visual"> <a class="c-card__image js-parallax o-media md:o-media--stretch relcon_link_fix" data-event-non-interaction="false" href="/news/intruders-face-detecting-ai-security-camera-fires-paintballs-teargas-paintcam" > <img class="c-card__imageImage js-parallaxLayer o-parallax__layer js-lazy" data-src="https://img-cdn.tnwcdn.com/image?fit=1167%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=584e2b92926b74e361b22e4880cf165c" data-srcset=" https://img-cdn.tnwcdn.com/image?fit=819%2C655&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=1f889d25a721c4cf2b83e528f678e23d 819w , https://img-cdn.tnwcdn.com/image?fit=1638%2C1310&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=205d735da633f71acae3de7e075fe293 1638w , https://img-cdn.tnwcdn.com/image?fit=2457%2C1965&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=58edf11e0410bb77b07a16c4b527d8c9 2457w , https://img-cdn.tnwcdn.com/image?fit=326%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=05b8292eb6dedd867d1bc5a9f585b903 326w , https://img-cdn.tnwcdn.com/image?fit=652%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=a3078767524a6a6c85fd7f3a8079932b 652w , https://img-cdn.tnwcdn.com/image?fit=978%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=90b3e2f6225d99c617b0ffd8f85027f1 978w , https://img-cdn.tnwcdn.com/image?fit=457%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=f093678d16e8725bc71167833017203a 457w , https://img-cdn.tnwcdn.com/image?fit=914%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=f40fa3ba9acb54ea81d2d7bdb024db1d 914w , https://img-cdn.tnwcdn.com/image?fit=1371%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=0266584cef131d24361beb066def8108 1371w , https://img-cdn.tnwcdn.com/image?fit=241%2C255&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=13e2ade20cd639c1f5dd1391f043ffaf 241w , https://img-cdn.tnwcdn.com/image?fit=482%2C510&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=04855f57de1f71a83933ced41412f4f3 482w , https://img-cdn.tnwcdn.com/image?fit=723%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=df277927a28b6d7a2165622f53f9b081 723w , https://img-cdn.tnwcdn.com/image?fit=389%2C255&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=1d8d438c561585d333a30b3cc2567460 389w , https://img-cdn.tnwcdn.com/image?fit=778%2C510&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=01d5e76083916cdf4814fdc36e0bcfa0 778w , https://img-cdn.tnwcdn.com/image?fit=1167%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=584e2b92926b74e361b22e4880cf165c 1167w " sizes="(max-width:767px) 819px, (width: 768px) 326px, (min-width:768px) and (max-width:1023px) 457px, (width: 1024px) 241px, 389px" alt="Intruders beware: New face-detecting AI security cam fires paintballs and teargas" /> <noscript> <img class="c-card__imageImage js-parallaxLayer o-parallax__layer" src="https://img-cdn.tnwcdn.com/image?fit=1167%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=584e2b92926b74e361b22e4880cf165c" srcset=" https://img-cdn.tnwcdn.com/image?fit=819%2C655&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=1f889d25a721c4cf2b83e528f678e23d 819w , https://img-cdn.tnwcdn.com/image?fit=1638%2C1310&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=205d735da633f71acae3de7e075fe293 1638w , https://img-cdn.tnwcdn.com/image?fit=2457%2C1965&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=58edf11e0410bb77b07a16c4b527d8c9 2457w , https://img-cdn.tnwcdn.com/image?fit=326%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=05b8292eb6dedd867d1bc5a9f585b903 326w , https://img-cdn.tnwcdn.com/image?fit=652%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=a3078767524a6a6c85fd7f3a8079932b 652w , https://img-cdn.tnwcdn.com/image?fit=978%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=90b3e2f6225d99c617b0ffd8f85027f1 978w , https://img-cdn.tnwcdn.com/image?fit=457%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=f093678d16e8725bc71167833017203a 457w , https://img-cdn.tnwcdn.com/image?fit=914%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=f40fa3ba9acb54ea81d2d7bdb024db1d 914w , https://img-cdn.tnwcdn.com/image?fit=1371%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=0266584cef131d24361beb066def8108 1371w , https://img-cdn.tnwcdn.com/image?fit=241%2C255&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=13e2ade20cd639c1f5dd1391f043ffaf 241w , https://img-cdn.tnwcdn.com/image?fit=482%2C510&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=04855f57de1f71a83933ced41412f4f3 482w , https://img-cdn.tnwcdn.com/image?fit=723%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=df277927a28b6d7a2165622f53f9b081 723w , https://img-cdn.tnwcdn.com/image?fit=389%2C255&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=1d8d438c561585d333a30b3cc2567460 389w , https://img-cdn.tnwcdn.com/image?fit=778%2C510&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=01d5e76083916cdf4814fdc36e0bcfa0 778w , https://img-cdn.tnwcdn.com/image?fit=1167%2C765&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2024%2F04%2Feve-paintcam-home-security-system-cam.jpg&signature=584e2b92926b74e361b22e4880cf165c 1167w " sizes="(max-width:767px) 819px, (width: 768px) 326px, (min-width:768px) and (max-width:1023px) 457px, (width: 1024px) 241px, 389px" alt="Intruders beware: New face-detecting AI security cam fires paintballs and teargas" /> </noscript> </a> <header class="c-card__header"> <span class="c-card__label"> artificial intelligence </span> <h3 class="c-card__heading"> <a href="/news/intruders-face-detecting-ai-security-camera-fires-paintballs-teargas-paintcam" tabindex="-1">Intruders beware: New face-detecting AI security cam fires paintballs and teargas</a> </h3> </header> </div> </article> <article class="c-showcase__article"> <div class="c-card c-card--visual"> <a class="c-card__image js-parallax o-media md:o-media--stretch relcon_link_fix" data-event-non-interaction="false" href="/news/nym-accounces-decentralised-vpn-privacy-protection" > <img class="c-card__imageImage js-parallaxLayer o-parallax__layer js-lazy" data-src="https://img-cdn.tnwcdn.com/image?fit=2361%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=3c051e008baf1f2731d5a519ade34e4d" data-srcset=" https://img-cdn.tnwcdn.com/image?fit=819%2C655&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=e618dbf3f66615ba79ff86fec2adfa79 819w , https://img-cdn.tnwcdn.com/image?fit=1638%2C1310&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=0a7e5202eea11fa7b900e513830fd3a8 1638w , https://img-cdn.tnwcdn.com/image?fit=2457%2C1965&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=50251f612a92a5094466a5e57a1d4e22 2457w , https://img-cdn.tnwcdn.com/image?fit=326%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=d1d4925b859b54cea2ace94f5e273b2c 326w , https://img-cdn.tnwcdn.com/image?fit=652%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=7abd04dadb5600d391412460ba2f62d5 652w , https://img-cdn.tnwcdn.com/image?fit=978%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=325f8db05911a690ef9c64a6059d7413 978w , https://img-cdn.tnwcdn.com/image?fit=457%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=182e04f6fc465c16e02d5ad74987bd4a 457w , https://img-cdn.tnwcdn.com/image?fit=914%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=410780ca2bfb3f513c3c173fe9a4fe8e 914w , https://img-cdn.tnwcdn.com/image?fit=1371%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=37ec0e74e545e2e64a4c21015704b26d 1371w , https://img-cdn.tnwcdn.com/image?fit=490%2C387&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=d0b7f50dc8865098e160f840a70cbe93 490w , https://img-cdn.tnwcdn.com/image?fit=980%2C774&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=efaa9736a431b1e7bdc6c67d0aee7a7f 980w , https://img-cdn.tnwcdn.com/image?fit=1470%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=289ba6fd45e4ae1ab64a320cc3ecc384 1470w , https://img-cdn.tnwcdn.com/image?fit=787%2C387&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=9af4a2999325c7456a217cd11bacce14 787w , https://img-cdn.tnwcdn.com/image?fit=1574%2C774&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=372c64aa7db18147319e56f4f03ea364 1574w , https://img-cdn.tnwcdn.com/image?fit=2361%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=3c051e008baf1f2731d5a519ade34e4d 2361w " sizes="(max-width:767px) 819px, (width: 768px) 326px, (min-width:768px) and (max-width:1023px) 457px, (width: 1024px) 490px, 787px" alt="A new decentralised VPN aims to patch a gaping security hole" /> <noscript> <img class="c-card__imageImage js-parallaxLayer o-parallax__layer" src="https://img-cdn.tnwcdn.com/image?fit=2361%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=3c051e008baf1f2731d5a519ade34e4d" srcset=" https://img-cdn.tnwcdn.com/image?fit=819%2C655&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=e618dbf3f66615ba79ff86fec2adfa79 819w , https://img-cdn.tnwcdn.com/image?fit=1638%2C1310&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=0a7e5202eea11fa7b900e513830fd3a8 1638w , https://img-cdn.tnwcdn.com/image?fit=2457%2C1965&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=50251f612a92a5094466a5e57a1d4e22 2457w , https://img-cdn.tnwcdn.com/image?fit=326%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=d1d4925b859b54cea2ace94f5e273b2c 326w , https://img-cdn.tnwcdn.com/image?fit=652%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=7abd04dadb5600d391412460ba2f62d5 652w , https://img-cdn.tnwcdn.com/image?fit=978%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=325f8db05911a690ef9c64a6059d7413 978w , https://img-cdn.tnwcdn.com/image?fit=457%2C198&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=182e04f6fc465c16e02d5ad74987bd4a 457w , https://img-cdn.tnwcdn.com/image?fit=914%2C396&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=410780ca2bfb3f513c3c173fe9a4fe8e 914w , https://img-cdn.tnwcdn.com/image?fit=1371%2C594&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=37ec0e74e545e2e64a4c21015704b26d 1371w , https://img-cdn.tnwcdn.com/image?fit=490%2C387&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=d0b7f50dc8865098e160f840a70cbe93 490w , https://img-cdn.tnwcdn.com/image?fit=980%2C774&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=efaa9736a431b1e7bdc6c67d0aee7a7f 980w , https://img-cdn.tnwcdn.com/image?fit=1470%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=289ba6fd45e4ae1ab64a320cc3ecc384 1470w , https://img-cdn.tnwcdn.com/image?fit=787%2C387&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=9af4a2999325c7456a217cd11bacce14 787w , https://img-cdn.tnwcdn.com/image?fit=1574%2C774&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=372c64aa7db18147319e56f4f03ea364 1574w , https://img-cdn.tnwcdn.com/image?fit=2361%2C1161&url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F11%2FUntitled-design-6.jpg&signature=3c051e008baf1f2731d5a519ade34e4d 2361w " sizes="(max-width:767px) 819px, (width: 768px) 326px, (min-width:768px) and (max-width:1023px) 457px, (width: 1024px) 490px, 787px" alt="A new decentralised VPN aims to patch a gaping security hole" /> </noscript> </a> <header class="c-card__header"> <span class="c-card__label"> data security </span> <h3 class="c-card__heading"> <a href="/news/nym-accounces-decentralised-vpn-privacy-protection" tabindex="-1">A new decentralised VPN aims to patch a gaping security hole</a> </h3> </header> </div> </article> </section> </div> </section> </div> </aside> </main> <script> const channelArticlesList = document.getElementById('article_container'); function timeOutWrapper() { document.addEventListener( 'DOMContentLoaded', function() { document.body.classList.remove( 'preload', 'render-canvas' ); } ); function callback( mutationsList, observer ) { mutationsList.forEach( mutation => { if ( mutation.attributeName === 'class' ) { if ( document.body.classList.contains( 'is-canvas' ) ) { channelArticlesList.classList.add( 'render-canvas' ); } } } ); } const mutationObserver = new MutationObserver(callback); mutationObserver.observe( document.body, { attributes: true, } ); } timeOutWrapper(); </script> </div> </div> <footer class="c-footer"> <div class="o-wrapper"> <div class="o-grid o-grid--gap-l"> <div class="o-grid__col lg:o-grid__col--1/2"> <div class="c-footer__logoContact"> <div> <a class="c-footer__logo" data-event-category="Footer" data-event-action="TNW Logo" data-event-label="Navigation" data-event-non-interaction="false" href="https://thenextweb.com/" title="TNW" tabindex="-1"> <svg preserveAspectRatio="xMidYMid meet" viewbox="0 0 66 16"> <path fill="#fff" d="M32.23993 5A6.00284 6.00284 0 0 1 34 9.24261V16h-6v-5.929a2.00249 2.00249 0 0 0-.58856-1.41424l-2.07239-2.07101A2.00315 2.00315 0 0 0 23.92346 6H22v10h-6V0h8.75189a6 6 0 0 1 4.24268 1.75739zM60 0v5.929a2.00245 2.00245 0 0 1-.58856 1.41418l-2.07385 2.071A1.99969 1.99969 0 0 1 55.9234 10h-2.88214A5.99166 5.99166 0 0 0 54 6.75732V0h-6v5.929a2.00245 2.00245 0 0 1-.58856 1.41418l-2.07385 2.071A1.99969 1.99969 0 0 1 43.9234 10H42V0h-6v16h8.75189a6.003 6.003 0 0 0 4.244-1.75739L51 12.23938V16h5.75189a6.003 6.003 0 0 0 4.244-1.75739l3.244-3.24267A6.00264 6.00264 0 0 0 66 6.75732V0zM0 6h4v10h6V6h4V0H0z"></path> </svg> </a> <p class="c-footer__tagline">The heart of tech</p> </div> <div> <ul class="c-footer__contact"> <li class="c-footer__contactItem"><a class="c-footer__contactLink" data-event-category="Footer" data-event-action="Socials" data-event-label="Faaaaebook" href="https://facebook.com/thenextweb" target="_blank" rel="noopener noreferrer" name="Facebook Contact Icon"><svg class="c-footer__contactIcon"><use xlink:href="/assets/next/img/icons.svg#facebook"></use></svg></a></li> <li class="c-footer__contactItem"><a class="c-footer__contactLink" data-event-category="Footer" data-event-action="Socials" data-event-label="Instagram" href="https://www.instagram.com/thenextweb/" target="_blank" rel="noopener noreferrer" name="Instagram Contact Icon"><svg class="c-footer__contactIcon"><use xlink:href="/assets/next/img/icons.svg#instagram"></use></svg></a></li> <li class="c-footer__contactItem"><a class="c-footer__contactLink" data-event-category="Footer" data-event-action="Socials" data-event-label="Twitter" href="https://twitter.com/thenextweb" target="_blank" rel="noopener noreferrer" name="Twitter Contact Icon"><svg class="c-footer__contactIcon"><use xlink:href="/assets/next/img/icons.svg#twitter"></use></svg></a></li> <li class="c-footer__contactItem"><a class="c-footer__contactLink" data-event-category="Footer" data-event-action="Socials" data-event-label="Youtube" href="https://youtube.com/user/thenextweb" target="_blank" rel="noopener noreferrer" name="Youtube Contact Icon"><svg class="c-footer__contactIcon"><use xlink:href="/assets/next/img/icons.svg#youtube"></use></svg></a></li> <li class="c-footer__contactItem"><a class="c-footer__contactLink" data-event-category="Footer" data-event-action="Socials" data-event-label="Flipboard" href="https://flipboard.com/@thenextweb" target="_blank" rel="noopener noreferrer" name="Flipboard Contact Icon"><svg class="c-footer__contactIcon"><use xlink:href="/assets/next/img/icons.svg#flipboard"></use></svg></a></li> <li class="c-footer__contactItem"><a class="c-footer__contactLink" data-event-category="Footer" data-event-action="Socials" data-event-label="Mail" href="/newsletters" name="Email Footer Link"><svg class="c-footer__contactIcon"><use xlink:href="/assets/next/img/icons.svg#mail"></use></svg></a></li> <li class="c-footer__contactItem"><a class="c-footer__contactLink" data-event-category="Footer" data-event-action="Socials" data-event-label="Linkedin" href="https://www.linkedin.com/company/the-next-web" target="_blank" rel="noopener noreferrer" name="LinkedIn Contact Icon"><svg class="c-footer__contactIcon"><use xlink:href="/assets/next/img/icons.svg#linkedin"></use></svg></a></li> </ul> </div> </div> </div> <br> <div class="o-grid__col--1/2 lg:o-grid__col--1/4 more"> <h2 class="c-footer__heading">More TNW</h2> <ul class="c-footer__menu"> <li><a class="c-footer__menuLink" href="/latest" data-event-category="Footer" data-event-action="More TNW" data-event-label="Media" data-event-non-interaction="false">Media</a></li> <li><a class="c-footer__menuLink" href="/events" data-event-category="Footer" data-event-action="More TNW" data-event-label="Events" data-event-non-interaction="false">Events</a></li> <li><a class="c-footer__menuLink" href="/programs" data-event-category="Footer" data-event-action="More TNW" data-event-label="Programs" data-event-non-interaction="false">Programs</a></li> <li><a class="c-footer__menuLink" href="/spaces" data-event-category="Footer" data-event-action="More TNW" data-event-label="Spaces" data-event-non-interaction="false">Spaces</a></li> <li><a class="c-footer__menuLink" href="/newsletters" data-event-category="Footer" data-event-action="More TNW" data-event-label="Newsletters" data-event-non-interaction="false">Newsletters</a></li> <li><a class="c-footer__menuLink" target="_blank" rel="noopener" href="https://talent.thenextweb.com/job-board?source=footer&utm_source=footer&utm_medium=partner_referral" data-event-category="Footer" data-event-action="More TNW" data-event-label="Jobs" data-event-non-interaction="false">Jobs in tech</a></li> </ul> </div> <div class="o-grid__col--1/2 lg:o-grid__col--1/4 about"> <h2 class="c-footer__heading">About TNW</h2> <ul class="c-footer__menu"> <li><a class="c-footer__menuLink" data-event-category="Footer" data-event-action="About TNW" data-event-label="Partner with us" data-event-non-interaction="false" href="/partnerships" name="Partner with us">Partner with us</a></li> <li><a class="c-footer__menuLink" data-event-category="Footer" data-event-action="About TNW" data-event-label="Jobs" data-event-non-interaction="false" href="https://thenextweb.homerun.co/" target="_blank" rel="noopener noreferrer" name="Jobs">Jobs</a></li> <li><a class="c-footer__menuLink" data-event-category="Footer" data-event-action="About TNW" data-event-label="Terms & Conditions" data-event-non-interaction="false" href="/terms-and-conditions" name="Terms & Conditions">Terms & Conditions</a></li> <li><a class="c-footer__menuLink" data-event-category="Footer" data-event-action="About TNW" data-event-label="Cookie Statement" data-event-non-interaction="false" href="/cookie-statement" name="Cookie Statement">Cookie Statement</a></li> <li><a class="c-footer__menuLink" data-event-category="Footer" data-event-action="About TNW" data-event-label="Privacy Statement" data-event-non-interaction="false" href="/privacy-statement " name="Privacy Statement">Privacy Statement</a></li> <li><a class="c-footer__menuLink" data-event-category="Footer" data-event-action="About TNW" data-event-label="Editorial Policy" data-event-non-interaction="false" href="https://s3.eu-west-1.amazonaws.com/tnw.uploads/uploads/FT-EDITORIAL-CODE-OF-PRACTICE-15-Jan-2024.pdf" target="_blank" rel="noopener noreferrer" name="Editorial Policy">Editorial Policy</a></li> <li><a class="c-footer__menuLink" data-event-category="Footer" data-event-action="About TNW" data-event-label="Masthead" data-event-non-interaction="false" href="/masthead" rel="noopener" name="Editorial Policy">Masthead</a></li> </ul> </div> </div> </div> <div class="c-footer__legal max-md:px-l"> <a href="https://www.ft.com/" data-event-category="Footer" data-event-action="Financial Times" data-event-label="Financial Times" data-event-non-interaction="false" target="_blank" rel="noopener nofollow" class="feedback" > <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 367 32"> <path d="M13.97826,19.58347H5.20213L2.77475,26H0L8.32426,4.7043H10.89L19.21428,26H16.43953ZM6.10446,17.19h6.97148L9.57254,8.1032Z" fill="#fff"/><path d="M29.98145,26V4.7043h13.597V7.89421H33.58934v6.31344H42.919v3.156H33.58934V26Z" fill="#fff"/><path d="M48.686,8.06789a2.15357,2.15357,0,0,1-2.15061-2.1153,2.1509,2.1509,0,0,1,4.30122,0A2.15357,2.15357,0,0,1,48.686,8.06789ZM50.42,26H46.95193V10.59977H50.42Z" fill="#fff"/><path d="M54.72547,10.59977h3.46809V12.057a5.4558,5.4558,0,0,1,4.16284-1.80323c3.46808,0,5.445,2.289,5.445,5.72178V26H64.33332V16.56584c0-1.90773-.93763-3.156-2.91455-3.156a3.26275,3.26275,0,0,0-3.22521,2.46268V26H54.72547Z" fill="#fff"/><path d="M80.43536,16.14927c0-1.734-1.38667-2.73945-3.53728-2.73945a7.59209,7.59209,0,0,0-4.26592,1.35278V11.57128a9.19852,9.19852,0,0,1,4.89006-1.31747c3.98915,0,6.24284,2.15061,6.24284,5.65258V26h-3.3297v-.867a6.23474,6.23474,0,0,1-3.78016,1.14379c-3.19132,0-5.75708-1.94162-5.75708-5.02845,0-2.91313,2.60106-4.96066,6-4.96066a7.1758,7.1758,0,0,1,3.53728.93762Zm0,4.47491c-.38126-.97152-1.734-1.56036-3.12071-1.56036-1.59566,0-3.19132.69334-3.19132,2.1845,0,1.52647,1.59566,2.21981,3.19132,2.21981,1.38667,0,2.73945-.59026,3.12071-1.56036Z" fill="#fff"/><path d="M87.86718,10.59977h3.46809V12.057a5.45578,5.45578,0,0,1,4.16283-1.80323c3.46809,0,5.445,2.289,5.445,5.72178V26H97.475V16.56584c0-1.90773-.93763-3.156-2.91455-3.156a3.26274,3.26274,0,0,0-3.22521,2.46268V26H87.86718Z" fill="#fff"/><path d="M111.63545,10.25381a6.50162,6.50162,0,0,1,4.19672,1.28217v3.40031a5.4709,5.4709,0,0,0-3.95385-1.59566c-2.46268,0-4.4396,1.97692-4.4396,4.95925,0,2.98375,1.97692,4.96067,4.4396,4.96067a5.47663,5.47663,0,0,0,3.95385-1.59566v3.3989a6.50259,6.50259,0,0,1-4.19672,1.28358c-4.232,0-7.66623-3.12212-7.66623-8.04749S107.40342,10.25381,111.63545,10.25381Z" fill="#fff"/><path d="M120.93828,8.06789a2.15357,2.15357,0,0,1-2.15061-2.1153,2.1509,2.1509,0,0,1,4.30122,0A2.15357,2.15357,0,0,1,120.93828,8.06789ZM122.67233,26h-3.46809V10.59977h3.46809Z" fill="#fff"/><path d="M135.50962,16.14927c0-1.734-1.38667-2.73945-3.53728-2.73945a7.59209,7.59209,0,0,0-4.26592,1.35278V11.57128a9.19852,9.19852,0,0,1,4.89006-1.31747c3.98915,0,6.24284,2.15061,6.24284,5.65258V26h-3.3297v-.867a6.23474,6.23474,0,0,1-3.78016,1.14379c-3.19132,0-5.75708-1.94162-5.75708-5.02845,0-2.91313,2.60106-4.96066,6-4.96066a7.1758,7.1758,0,0,1,3.53728.93762Zm0,4.47491c-.38127-.97152-1.73405-1.56036-3.12072-1.56036-1.59566,0-3.19132.69334-3.19132,2.1845,0,1.52647,1.59566,2.21981,3.19132,2.21981,1.38667,0,2.73945-.59026,3.12072-1.56036Z" fill="#fff"/><path d="M146.40811,26H142.94V3.4546h3.46808Z" fill="#fff"/><path d="M157.27413,4.7043h17.75842V7.89421h-7.076V26H164.3501V7.89421h-7.076Z" fill="#fff"/><path d="M179.9678,8.06789a2.15357,2.15357,0,0,1-2.15061-2.1153,2.1509,2.1509,0,0,1,4.30122,0A2.15357,2.15357,0,0,1,179.9678,8.06789ZM181.70184,26h-3.46809V10.59977h3.46809Z" fill="#fff"/><path d="M201.96248,10.25381c3.12072,0,4.99456,2.2198,4.99456,5.72178V26h-3.4695V16.53054c0-1.90632-.83172-3.156-2.53188-3.156a2.70093,2.70093,0,0,0-2.73945,2.289V26h-3.46809V16.53054c0-1.90632-.83313-3.156-2.53187-3.156a2.70231,2.70231,0,0,0-2.74086,2.289V26H186.0073V10.59977h3.46809v1.28359a4.67951,4.67951,0,0,1,3.85076-1.62955,5.07645,5.07645,0,0,1,4.05693,2.04611A5.6743,5.6743,0,0,1,201.96248,10.25381Z" fill="#fff"/><path d="M217.61689,26.34737c-4.47349,0-7.63092-3.08682-7.63092-7.9091,0-4.78557,2.98374-8.18446,7.076-8.18446,4.232,0,6.48572,3.01763,6.48572,7.56032v1.24969H213.38627a4.36215,4.36215,0,0,0,4.71638,4.29981,7.11212,7.11212,0,0,0,4.4043-1.422v3.05293A8.13643,8.13643,0,0,1,217.61689,26.34737Zm-4.05834-9.91991h6.69471a3.10814,3.10814,0,0,0-3.156-3.26052A3.588,3.588,0,0,0,213.55855,16.42746Z" fill="#fff"/><path d="M226.26311,21.213a7.9172,7.9172,0,0,0,5.20213,2.25511c1.49116,0,2.67026-.52106,2.67026-1.631,0-1.03929-.76253-1.38667-2.04612-1.80323l-1.66485-.51965c-2.63637-.83313-4.16142-2.01223-4.16142-4.64859,0-2.77476,2.49657-4.61188,5.79238-4.61188a8.38994,8.38994,0,0,1,4.61188,1.35278v3.502a6.95868,6.95868,0,0,0-4.61188-1.97692c-1.38808,0-2.46268.59025-2.46268,1.59566,0,1.00682.58884,1.35278,1.97692,1.76935l2.01082.62414c2.56717.83313,3.92,2.1845,3.92,4.5441,0,2.94844-2.63637,4.68248-6.07056,4.68248a8.48739,8.48739,0,0,1-5.16683-1.59566Z" fill="#fff"/><path d="M249.82521,12.47361a7.08924,7.08924,0,0,1,5.27132-2.18591,6.30818,6.30818,0,0,1,4.12754,1.28358v2.63637a5.38989,5.38989,0,0,0-3.95385-1.59566,4.72822,4.72822,0,0,0-3.50339,1.52647,5.73715,5.73715,0,0,0-1.45728,4.16142,5.743,5.743,0,0,0,1.45728,4.16284,4.732,4.732,0,0,0,3.50339,1.52505,5.38853,5.38853,0,0,0,3.95385-1.59424v2.635a6.30813,6.30813,0,0,1-4.12754,1.28359,7.1933,7.1933,0,0,1-5.27132-2.15061,8.01492,8.01492,0,0,1-2.15061-5.86158A7.87619,7.87619,0,0,1,249.82521,12.47361Z" fill="#fff"/><path d="M273.90272,24.057a6.93067,6.93067,0,0,1-10.232,0,8.56076,8.56076,0,0,1-1.94162-5.75709,8.56075,8.56075,0,0,1,1.94162-5.75708,6.93067,6.93067,0,0,1,10.232,0,8.41292,8.41292,0,0,1,1.97692,5.75708A8.41293,8.41293,0,0,1,273.90272,24.057Zm-5.099-11.48028c-2.77475,0-4.4396,2.39349-4.4396,5.72319s1.66485,5.7232,4.4396,5.7232,4.43961-2.39349,4.43961-5.7232S271.57842,12.57669,268.80367,12.57669Z" fill="#fff"/><path d="M295.03462,10.2877c3.08682,0,4.85617,2.18591,4.85617,5.51561V26h-2.63637V16.21847c0-2.11531-.93621-3.57259-2.91314-3.57259a3.56186,3.56186,0,0,0-3.4003,2.74087V26h-2.60107V16.21847c0-2.11531-.93622-3.57259-2.91314-3.57259a3.5603,3.5603,0,0,0-3.39889,2.74087V26h-2.60107V10.59977h2.60107v1.80465a4.77136,4.77136,0,0,1,4.16142-2.11672,4.56953,4.56953,0,0,1,4.16283,2.46268A5.61944,5.61944,0,0,1,295.03462,10.2877Z" fill="#fff"/><path d="M306.91028,31.89688h-2.60107V10.59977h2.60107v1.80465a5.47521,5.47521,0,0,1,4.33511-2.11672,5.97708,5.97708,0,0,1,5.16824,2.42879,9.16121,9.16121,0,0,1,1.76935,5.58339,9.34026,9.34026,0,0,1-1.76935,5.6187,6.039,6.039,0,0,1-5.16824,2.39349,5.4743,5.4743,0,0,1-4.33511-2.11531Zm0-10.47487a4.49749,4.49749,0,0,0,3.95385,2.53187c2.91313,0,4.68248-2.42879,4.68248-5.654s-1.76935-5.654-4.68248-5.654a4.4975,4.4975,0,0,0-3.95385,2.53188Z" fill="#fff"/><path d="M330.29728,15.768c0-1.90773-1.422-3.08682-3.67708-3.08682a7.75913,7.75913,0,0,0-4.37041,1.35278V11.57128a8.82,8.82,0,0,1,4.787-1.28358c3.60647,0,5.79239,2.04611,5.79239,5.27273V26h-2.53188V24.8548a6.22354,6.22354,0,0,1-3.98915,1.422,6.54463,6.54463,0,0,1-4.05834-1.31748,4.33611,4.33611,0,0,1-1.66485-3.60647,4.1488,4.1488,0,0,1,1.70015-3.4695,6.8181,6.8181,0,0,1,8.01219-.10308Zm0,4.82087c-.41656-1.14379-1.943-1.90773-3.57258-1.90773a4.84209,4.84209,0,0,0-2.53188.65944,2.11057,2.11057,0,0,0-1.1452,2.01223,2.24887,2.24887,0,0,0,1.1452,2.08,4.82881,4.82881,0,0,0,2.53188.65945c1.62955,0,3.156-.76253,3.57258-1.90773Z" fill="#fff"/><path d="M337.27723,10.59977h2.60107v1.943a5.69746,5.69746,0,0,1,4.5441-2.2551c3.46809,0,5.40971,2.289,5.40971,5.61869V26h-2.635V16.323c0-2.11531-1.076-3.64177-3.40031-3.64177a4.178,4.178,0,0,0-3.91854,2.87924V26h-2.60107Z" fill="#fff"/><path d="M356.05094,31.89688l2.32289-5.79239-6-15.50472h2.81l4.54269,12.13972,4.47491-12.13972h2.70556l-8.29037,21.29711Z" fill="#fff"/> </svg> </a> <p> Copyright © 2006—2024, The Next Web B.V. Made with <3 in Amsterdam. <br> </p> </div> </footer> <script src="//next.tnwcdn.com/assets/next/js/base.js?3d092509c4c6da02d7b420a4fa2cf897d7f1145e" async defer></script> <script type="text/javascript"> window.csrfTokenName = "CRAFT_CSRF_TOKEN"; window.csrfTokenValue = "sbuMZ8d_mWkYFkP244MON5C_ZxGra1Qkj4D3l4b5_ueZ0QisHztFp_6Ixz2_NdwkUWcuz6rNY1LX8QN4wS8\u002DSOHfw_31vtO92pZrxmgIE\u002DM\u003D"; </script> <script> var ENV = { "paths": { "assets": "/assets" } }; </script> <script defer src="https://widgets.jobbio.com/partner_fluid_widgets_v1.6.1/display.min.js" id="jobbio-display-script"></script> <script> window.onload = function () { jobbio_display.widget({ slug: 'tnw-jobs', container: 'sidebarJobbio', style: 'sidebar', count: 5, type: 'multiple', content: 'jobs' }); } </script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag("js", new Date()); gtag("config", "G-1FX48DMMCB", { "cookie_flags": "max-age=7200;secure;samesite=none" }); </script> <script type="text/javascript" data-cfasync="false" async> gtag("event", "page_view", { "post_author": "Amir Vashkover", "post_date": "2024-08-29", "post_primary_category": "Data and security", "post_sponsored": "false", "url_path": window.location.pathname, "url_referrer": document.referrer, "user_agent": navigator.userAgent }); </script> <script> !function(t,e){var o,n,p,r;e.__SV||(window.posthog=e,e._i=[],e.init=function(i,s,a){function g(t,e){var o=e.split(".");2==o.length&&(t=t[o[0]],e=o[1]),t[e]=function(){t.push([e].concat(Array.prototype.slice.call(arguments,0)))}}(p=t.createElement("script")).type="text/javascript",p.async=!0,p.src=s.api_host.replace(".i.posthog.com","-assets.i.posthog.com")+"/static/array.js",(r=t.getElementsByTagName("script")[0]).parentNode.insertBefore(p,r);var u=e;for(void 0!==a?u=e[a]=[]:a="posthog",u.people=u.people||[],u.toString=function(t){var e="posthog";return"posthog"!==a&&(e+="."+a),t||(e+=" (stub)"),e},u.people.toString=function(){return u.toString(1)+".people (stub)"},o="init capture register register_once register_for_session unregister unregister_for_session getFeatureFlag getFeatureFlagPayload isFeatureEnabled reloadFeatureFlags updateEarlyAccessFeatureEnrollment getEarlyAccessFeatures on onFeatureFlags onSessionId getSurveys getActiveMatchingSurveys renderSurvey canRenderSurvey getNextSurveyStep identify setPersonProperties group resetGroups setPersonPropertiesForFlags resetPersonPropertiesForFlags setGroupPropertiesForFlags resetGroupPropertiesForFlags reset get_distinct_id getGroups get_session_id get_session_replay_url alias set_config startSessionRecording stopSessionRecording sessionRecordingStarted captureException loadToolbar get_property getSessionProperty createPersonProfile opt_in_capturing opt_out_capturing has_opted_in_capturing has_opted_out_capturing clear_opt_in_out_capturing debug".split(" "),n=0;n<o.length;n++)g(u,o[n]);e._i.push([i,s,a])},e.__SV=1)}(document,window.posthog||[]); posthog.init("phc_3r1zuDjOPsVyL6Hu2eChdvyJBv95AKRDXrEsvw5d0RA",{api_host:"https://eu.i.posthog.com", person_profiles: "identified_only", enable_heatmaps: true, opt_in_site_apps: true}) </script> <script type="text/javascript" data-cfasync="false" async> posthog.register({ "Article Author": "Amir Vashkover", "Article Category Primary": "data-security", "Article Publish Date": "2024-08-29", "Article Publish Week": "2024-35", "Article Sponsored": "false", "Article Words": "1396", "Page Title": "Quantum computing: the inevitable threat to information security", "UTM Source (Hit)": window.URLSearchParams && new URLSearchParams(window.location.search).get("utm_source"), "UTM Medium (Hit)": window.URLSearchParams && new URLSearchParams(window.location.search).get("utm_medium"), "UTM Campaign (Hit)": window.URLSearchParams && new URLSearchParams(window.location.search).get("utm_campaign"), "UTM Term (Hit)": window.URLSearchParams && new URLSearchParams(window.location.search).get("utm_term"), "UTM Content (Hit)": window.URLSearchParams && new URLSearchParams(window.location.search).get("utm_content") }); </script> <script type="text/javascript" id="hs-script-loader" src="//js-eu1.hs-scripts.com/7066311.js" async="async" defer="defer"></script> <div class="cookie-consent-banner" id="cookie-consent-banner" data-args='{"cookieName":"__tnw_cookieConsent","cookieExpirationDays":"365","consentChoices":["ad_storage","analytics_storage"],"redirectOnSave":true,"honorDoNotTrack":false,"stylesheet":"https:\/\/thenextweb.com\/cpresources\/46abf400\/style.css?v=1732276819","titleText":"Cookies","descriptionText":"<p>We use <a href=\"\/cookie-statement\">cookies<\/a> and other data for a number of reasons, such as keeping TNW sites reliable and secure, personalizing content and ads, providing social media features and to analyze how our sites are used.<\/p>","linkColor":"6644ff","linkHoverColor":"7755ff","primaryBtnText":"Accept & continue","primaryBtnBgColor":"","primaryBtnBgHoverColor":"","primaryBtnColor":"","primaryBtnHoverColor":"","secondaryBtnText":"Manage cookies","secondaryBtnURL":"\/cookie-statement","secondaryBtnRedirectURL":"https:\/\/thenextweb.com\/news\/quantum-computing-threat-information-security-inevitable","secondaryBtnColor":"6644ff","secondaryBtnHoverColor":"7755ff","debugMode":false}'></div><script src="https://thenextweb.com/cpresources/101a561f/main.js?v=1732276819" async="async" defer="defer"></script> </body> </html>