Why haven’t we managed to curtail the #Ransomware menace?

#Ransomware is the biggest cybersecurity threat facing the world today.

Ransomware is the biggest cybersecurity threat facing the world today, with the potential to significantly affect whole societies and economies – and the attacks are unrelenting, the head of the National Cyber Security Centre (NCSC) has warned.

“Even with a war raging in Ukraine – the biggest global cyber threat we still face is ransomware. That tells you something of the scale of the problem. Ransomware attacks strike hard and fast. They are evolving rapidly, they are all-pervasive, they’re increasingly offered by gangs as a service, lowering the bar for entry into cyber crime,” said Lindy Cameron, CEO of the NCSC In a speech at Tel Aviv Cyber Week. She added that the NCSC has dealt with “nationally significant incidents” along with hundreds of general cyber incidents that “affect the UK more widely every year”.

Working alongside other law enforcement agencies, Cameron said that the NCSC is working to understand the criminal system that helps drive ransomware attacks – and how the nature of ransomware gangs and the techniques they’re using to facilitate ransomware campaigns continue to evolve.

“We want to make ransomware an unprofitable and unattractive business,” said Cameron, who argued it’s not all doom and gloom when it comes to cybersecurity, going on to detail how the NCSC’s Active Cyber Defence Program has helped to disrupt cyberattacks targeting citizens.

According to newly released figures from cybersecurity company WatchGuard, the volume of ransomware has risen significantly with the amount of detected activity in the first quarter of 2022 more than three times what was detected during the same period last year. The report suggests that the emergence of aggressive ransomware and extortion operations including  #LAPSUS$ and #BlackCat are behind what’s described as “an ever-increasing ransomware and cyber-extortion threat landscape.”

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Why does #Blockchain need to be #QuantumSafe?

Blockchain is currently extremely vulnerable!

01 Communique Laboratory Inc. has been commissioned to develop the World’s First Quantum-Safe Blockchain designed for Tokens, NFTs, Smart Contracts for the Metaverse, De-centralized Finance (DeFi). It is expected that this best-in-class quantum-safe blockchain will be resilient against cyber adversaries, including quantum attacks.

Blockchain technology is vulnerable to cyber-attacks, including quantum threats. A recent crypto hack reported a loss of over $300 million due to hackers forging a wrong signature to fake a transaction1. These hacks have now become commonplace and it is anticipated that the introduction of quantum computing will increase them dramatically.

After an extensive global search, a consortium of highly successful crypto experts has selected the Company as their technology partner and Post-Quantum Cryptography (PQC) provider. The consortium (Talent Summit) is pursuing the new blockchain aggressively and is planning a Proof-of-Concept (PoC) within three months. The PoC of this new venture is the first step towards protecting the de-centralized eco-system.

“01 has taken a minority position in Talent Summit and in addition will be compensated for the development project by way of a payment of $250,000 cash plus a 10% royalty for the ongoing share of the “Tokens” per transaction,” said Andrew Cheung, the President and CEO of 01 Communique. 01 will protect the integrity of this state-of-the-art blockchain by using its patent-protected, quantum-safe, IronCAP™ technology. In addition to being quantum-safe and supporting smart contracts, this new blockchain is aiming at high-performance with the ability to process tens of thousands of transactions/second (TPS). “This revolutionary blockchain is essentially a transformation of the proven Solana blockchain into a quantum-safe version to be incorporated in Tokens, NFTs, Smart Contracts for Metaverse, DeFi, and more”, said Andrew Cheung.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Is IBM accelerating the #quantumcomputer development trajectory?

IBM has unveiled 4 new quantum processors that it plans to use in a quantum supercomputer!

Last week IBM updated its quantum computing roadmap for the 3rd time since the first one was published. In this new roadmap, IBM has provided new tools for kernel developers, algorithm developers, and model developers. These developments all require new hardware, software, and new architecture.

The roadmap suggests that IBM will accelerate quantum’s expected trajectory by developing quantum processors that have the potential to scale to hundreds of thousands of qubits several years earlier than expected – and that’s a problem for current security, when it’s not quantum safe!

If IBM’s roadmap is implemented, it will change the landscape of quantum computing. 10 years ago, CPU-centric supercomputing was the exclusive domain of government and researchers for solving large and complex scientific problems. Since then, it has been democratized and transformed into various types of AI-centric supercomputing used in almost every industry today.

This roadmap is IBM’s plan to create a new family of quantum processors, software, and services that will lead to the realization of the next generation of supercomputers, a quantum-centric supercomputer. The combined resources of quantum processors, CPUs, and GPUs are expected to solve some of the world’s most challenging problems. In short the Quantum timeline is no longer science fiction – it now looks like this …

  • 2023 – Condor with 1121 Qubits
  • 2024 – Flamingo with 1386 Qubits
  • 2025 – Kookaburra with 4158+ Qubits
  • 2026 onward – hundreds of thousands Qubits!

… and there’s the problem, all encryption is now rendered useless! – That’s why The White House has announced that President Joe Biden has signed a National Security Memorandum (NSM) aimed at maintaining U.S. leadership in quantum information sciences and to mitigate the risks of quantum computing to the Nation’s security. “A cryptanalytically relevant quantum computer could jeopardize civilian and military communications as well as undermine supervisory and control systems for critical infrastructure,” said GEN Paul M. Nakasone, Commander, USCYBERCOM, Director, NSA/Chief, CSS. “The No. 1 defense against this quantum computing threat is to implement quantum-resistant cryptography on our most important systems.”

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Who is the #Ransomware Bad Guy?

So what is the biggest cause of Ransomware? Who’s the culprit? Email #Phishing has to be the answer!

Global Ransomware damage costs are predicted to exceed $265 Billion by 2031 (cybersecurityventures.com) Ransomware has been topping headline news on a daily basis and is becoming our No. 1 “cyber-enemy”. According to Harvard Business Review in May 2021, ransomware attacks were up 150% over the previous year. The amount paid by victims of these attacks increased more than 300% in 2020. This massive uptrend is further fuelled by accelerated digitalisation creating fertile soil for such attacks. The risk of data exposure will only grow given that remote workers’ personal devices are more vulnerable. According to the Cybercrime Magazine, ransomware damage costs are predicted to exceed USD265B annually and attacking a business, consumer, or device every 2 seconds by 203

Governments and critical infrastructure are not the only targets, ransomware attackers are less concerned about the industry and more focused on scope and scale. They go after large enterprise networks to secure the biggest possible ransom. Therefore, big enterprises e.g., banks, manufacturers and even high-tech companies and cybersecurity providers themselves are popular targets.

We believe enterprises should adopt a holistic approach, addressing the essential aspects including enhancing awareness and governance, while adopting suitable and robust technology solutions that best suit the technical environment that support the entity’s business operations. The adoption of true end-to-end encryption would be a key preventive measure, and leveraging the latest verifiable digital credentials would provide the average email user the means to verify the purported identity of the party sending the email.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

$325 million in #cryptocurrency disappears after an error on #GitHub

Imagine a security flaw that was fixed but then apparently not applied to the live application – as a result it was hacked!

The decentralized finance (DeFi) platform Wormhole became the victim of the largest cryptocurrency theft this year, and among the top five largest crypto hacks of all time, when an attacker exploited a security flaw to make off with close to $325 million!

The attack seems to have resulted from a recent update to the project’s GitHub repository, which revealed a fix to a bug that had not yet been deployed to the project itself. The attack was noticed when a post from the Wormhole Twitter account announced that the network was being taken “down for maintenance” while a potential exploit was investigated. A later post from Wormhole confirmed the hack and the amount stolen.

Shortly after the attack, the Wormhole team also offered the hacker a $10 million bounty to return the funds, which was embedded as text in a transaction sent to the attacker’s Ethereum wallet address.

Wormhole provides a service known as a “bridge” between blockchains, essentially an escrow system that allows one type of cryptocurrency to be deposited in order to create assets in another cryptocurrency. This allows a person or entity with holdings in one cryptocurrency to make trades and purchases using another, somewhat like being able to fund a bank account in dollars and then use a bank card to buy something priced in euros.

To carry out the attack, the attacker managed to forge a valid signature for a transaction that allowed them to freely mint 120,000 wETH — a “wrapped” Ethereum equivalent on the Solana blockchain, with value equivalent to $325 million at the time of the theft — without first inputting an equivalent amount. This was then exchanged for around $250 million in Ethereum that was sent from Wormhole to the hackers’ account, effectively liquidating a large amount of the platform’s Ethereum funds that were being held as collateral for transactions on the Solana blockchain.

Open-source code commits show that code that would have fixed this vulnerability was written and uploaded to the Wormhole GitHub repository on the day of the attack. Just hours later, the vulnerability was exploited by the hacker, suggesting that the updates had not yet been applied to the production application.

Due to the nature of cross-chain applications, the attack temporarily left a huge deficit between the amount of wrapped Ethereum and regular Ethereum held in the Wormhole bridge — as if the collateral asset backing a loan had suddenly disappeared. According to Forbes, the attack caused a 10 percent drop in the value of the Solana cryptocurrency in the aftermath of the hack.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

What if anyone could access your bitcoin wallet?

If the answer is yes, then that’s a game changer for cryptocurrencies!

So how do you access a bitcoin wallet. Accessing a Bitcoin wallet requires issuing a transaction to move Bitcoin from the address at which it resides to a new address; to perform such a transaction, you need knowledge of the private key associated with the Bitcoin address. Looking at how the FBI retrieved the Bitcoin from the Colonial Pipeline Hackers, Joseph Steinberg makes the following comment …

“It is no secret that cryptocurrencies enable various types of criminal activity and facilitate money laundering and the unreported transfers of large sums of money; as a result, I have wondered for years if lawmakers and law enforcement seemingly “turning a blind eye” to much of the issue has not been the result of naiveite, but because governments have “back doors” into popular crypto networks; are various government bodies able to better trace transactions than is commonly believed, to exploit zero-day implementation vulnerabilities in the crypto networks themselves or in the communications infrastructure upon which the networks rely, or to crack private keys far faster than outsiders believe through the use of quantum computers more advanced than are publicly known to  exist? Could Satoshi Nakomoto even be some government agency somewhere? Whoever knows the answers to these questions will clearly not answer them to the public. (Of course, if the FBI has such capabilities, it would likely use them sparingly and ascribe any successes to other techniques – just as the Allies did not act on every piece of data obtained by hacking Enigma so as not to alert the Nazis to Enigma’s compromise.)”

Also, it’s not a secret that quantum computers will eventually be able to rapidly crack the asymmetric encryption that forms the heart of modern-day digital signatures, nor is it a secret that many blockchain implementations – including those utilized by several popular cryptocurrencies – rely on potentially quantum-vulnerable asymmetric encryption algorithms to establish and authenticate the “owners” of their respective per-ledge-address contents.

Cryptocurrencies like Bitcoin and others are developed on blockchain technologies. Though advanced and sophisticated, the arrival of quantum computers are posing a serious threat to the security of blockchains. The only solution is to transition to quantum-safe blockchains utilizing post-quantum cryptography.

What is a quantum-safe blockchain? Well let’s run through the basics first. A blockchain is a database that is shared among the nodes of a computer network and stores data electronically. The jewel crown of this innovative blockchain technology is that it ensures the fidelity and security of a record of data which does not require a trusted third party.

Now that we know what blockchain truly means and how secure it is, we must also know that blockchain end points are vulnerable to quantum hacking. CISOs today and even blockchain experts are well aware of the fast-approaching quantum threats. The official Bitcoin website states that Bitcoin is vulnerable to quantum hacking just as most systems relying on cryptography in general are, including traditional banking systems. Some of the most recent hacks include $300M and $650M losses in cryptocurrencies that resulted from digital signature failures.

Besides cryptocurrency trading, the blockchain is a revolutionary technology that has many use cases. The blockchain is changing the face of businesses and governments today. It can be used for asset traceability, supply chain, trade payments, global payments, banking systems, voting and even digital identity. Using this very technology, new business models are evolving and disrupting the existing ones.

Just like all things on the internet, the blockchain requires security against quantum hacking. This is where IronCAP’s™ unique technology comes to use. We are developing the world’s first Quantum-Safe Blockchain designed for Tokens, NFTs, Smart Contracts for Metaverse, De-centralized Finance (DeFi) and more. This best-in-class quantum-safe blockchain can protect against cyber adversaries, including future quantum attacks. A revolutionary, state-of-the-art, quantum-safe blockchain has endless applications and use cases for every business.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Why did President Biden Sign a Memo to Combat Quantum Computing Threat?

This is a very good question … and at IronCAP™ we know the answer!

Finally, everyone is waking up to the fact that quantum computers are now a threat to security! There is a real and present danger. A quantum computer of sufficient size and sophistication( also known as a cryptanalytically relevant quantum computer) will be capable of breaking much of the public-key cryptography used on digital systems throughout  the world!

The White House has announced that President Joe Biden has signed a National Security Memorandum (NSM) aimed at maintaining U.S. leadership in quantum information sciences and to mitigate the risks of quantum computing to the Nation’s security.

“Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems” – also known as NSM-10 – directs U.S. Government agencies to migrate vulnerable cryptographic systems to quantum-resistant cryptography as part of multi-year effort. As the National Manager for National Security Systems, the Director of NSA will oversee this process across the 50-plus government departments and agencies using National Security Systems (NSS) – systems that contain classified information or are otherwise critical to military or intelligence operations.

“A cryptanalytically relevant quantum computer could jeopardize civilian and military communications as well as undermine supervisory and control systems for critical infrastructure,” said GEN Paul M. Nakasone, Commander, USCYBERCOM, Director, NSA/Chief, CSS. “The No. 1 defense against this quantum computing threat is to implement quantum-resistant cryptography on our most important systems.”

While NSA will spearhead many of the tasks in NSM-10 to ensure NSS are quantum resistant, the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA) will ensure U.S. critical infrastructure and other U.S. Government systems also move toward quantum-resistant cryptography.

“Implementing approved quantum-resistant cryptographic solutions across all of our systems will not happen overnight, but it’s critical that we chart a path to get there considering the potential threat of quantum computing,” said Rob Joyce, NSA Cybersecurity Director and Deputy National Manager for National Security Systems.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Industry adopts Quantum-Safe Encryption

It is disheartening to watch the global crisis these days.  Nevertheless, it is critical we address today’s encryption and IronCAP™ wants to educate people about the importance of cybersecurity, now more than ever.

Cyberattacks often spiked with military actions. The risk of cyberattacks now is very high and rising.  A slew of hackings have occurred in just the past two months. Recent victims include Samsung, gaming giant UbiSoft and the world’s largest GPU producer, Nvidia. Some analysts claimed that the Nvidia hack was a “national security disaster”.  In fact, every country is on high alert for cyberattacks now.  They are watching not only attacks posed by classical computers but also those posed by quantum computers.  They definitely need to ramp up their cyber defenses.

You may think that commercial quantum computers are still far away.  Well, you will realize you are wrong if you go on to read.  As per reports from March 4th 2022, The White House is concerned over the threat raised by post-quantum computing.  It recently released a National Security Memorandum which have huge implications for quantum technology and quantum security for the world.  Specifically, it instructs the National Security Agency (NSA) to update the Commercial National Security Algorithm Suite (CNSA Suite) and to transition their systems to use compliant and quantum-resistant cryptography. 

For the last 6 years our world-renowned team of crypto scientists have been working on a unique, Goppa code-based cryptographic encryption that has obtained a patent, backed by industry leaders and emerged unscathed in two global hackathons (2019 and 2020 respectively). More importantly IronCAP™ is available today!  It operates on classical computers and is quantum-safe, protecting your data from cyberattacks coming from quantum computers as well as classical computers.

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you?

References:

Venture Beat

EETimes

 

All Data Today is Quantum Vulnerable

In the last two years we have seen a continuous upward trend in the number of cybersecurity breaches, with the record high being broken month-over-month. It is about time companies need to improve their cybersecurity defenses. The number one thing they need to be aware of is that the current encryption that protects their data is NOT GOOD ENOUGH.

In 2021, approximately 281.5 million people have been affected by a data breach.  More than 60% of the U.S. information security professionals said ransomware is as serious as terrorism. According to IBM, the average cost of a data breach is over $4 million and Mimecast estimates the average ransomware demand against US companies is over $6 million.  Even more alarming, Cybersecurity Ventures expects global cybercrime cost to reach $10.5 trillion USD annually by 2025.

It has been proven in the last two years that it’s a child’s play to phish individual’s private data; and no magic to breach the cybersecurity defenses of a multimillion-dollar company. This will get even more disastrous with quantum advancements headed our way.  Nation states and tech giants are already spending millions on quantum advancements. For example, on August 26th 2020, the U.S. Department of Energy (DOE) budgeted $625 million for quantum advancements. In 2021, Honeywell Quantum Solutions and Cambridge Quantum achieved a quantum volume of 1,024 and demonstrated real-time error correction that enables quantum machines to do more significant calculations with fewer qubits. And most recently in 2022, research led by the University of New South Wales, Sydney has proven that a near error-free quantum computing is possible, paving the way for large silicon-based quantum processors for real-world manufacturing and application.

Q-day, the day when quantum computers render all current encryption meaningless will soon be here, and may have even arrived already. Quantum threats are very real and we must become quantum-safe now in order to beat Q-day.

Government agencies across the globe are scrambling to find the best quantum-safe methodology. Among them the highly regarded NIST (National Institute of Standards and Technology) in the US is still two years away from announcing their “preferred method”.  It will be a big mistake to leave our data at risk of quantum threats now and wait for two more years.   Fortunately, a group of crypto-scientists have pioneered the development of IronCAP™ starting several years ago.  It’s a patent-protected quantum-safe encryption technology based on Goppa code-based system – 1 of the 5 favorable post-quantum cryptographic approaches recommended by NIST at this time.  IronCAPTM is readily available for people to deploy on their classical computers today. It can be integrated with all kinds of vertical solutions such as email/file encryption, remote access/VPN, cloud storage, 5G/IoT, blockchains, financial transactions, etc., and safeguard you from cyber threats today and in the soon to arrive quantum computing era.

Learn more: www.ironcap.ca

References:
University of New South Wales research
Honeywell

Achieve Cyber Resilience with Thales and IronCAP

Cybersecurity is critical to an organization’s digital health and resilience.  A vast majority of organizations around the globe rely heavily on digital technologies to function daily.  Consciously or unconsciously, we allow our data to be digitized and stored.  We are sharing all kinds of data online, be it a friendly invite, financial data or corporate contracts.  01 Communique has taken another step forward, partnering with Thales, a trusted global technology leader to provide quantum-safe cryptographic solutions to help businesses and government agencies achieve cyber resilience.  IronCAP™ will work closely with Thales to integrate and ensure compatibility with Thales’ Luna HSM solutions as well as joint-marketing the solutions.  For more information about the partnership:

https://cpl.thalesgroup.com/partners/01-communique-laboratory-inc

Research suggests in 2021, approximately 281.5 million people have been affected by a data breach and there were 160 million victims in the third quarter alone compared to 121 million victims in the first and second quarters.  That’s not all.  60% of the U.S. information security professionals say ransomware is as serious as terrorism.  According to Cybersecurity Ventures, by the end of 2021, it was estimated that an organization will be hit with a ransomware attack in every 11 seconds.  Every 11 seconds…that’s something to really think about.

Whether you are a cybersecurity geek or not, you likely have heard about the various quantum advancements in 2020 and 2021.  The rapid acceleration of quantum computing advancements threaten our current encryption algorithms. It’s a known fact that early-stage quantum computers are here and readily available for anybody to use. You read that right!  Back in 2019, IBM had already unveiled their first commercial quantum computer. In 2021 IBM delivered its 127 qubit Eagle processor, and declared that by 2023 it would be able to deliver a “quantum advantage.” Even Amazon offered their quantum computers for the public to use via their cloud service BRAKET.  In the summer of 2020, Honeywell announced that their quantum computers were superior to IBM’s and Google’s.  They also claimed they would increase their quantum volume 10X each year, and are sure trying to deliver. In 2021 Honeywell Quantum Solutions and Cambridge Quantum achieved a quantum volume of 1,024 and demonstrated real-time error correction, to a breakthrough algorithm that enables quantum machines to do more significant calculations with fewer qubits. It’s evident that the global quantum computing race has begun some time ago already and is advancing rapidly.

Unlike hardware, data cannot be replaced when encryption goes obsolete.  Data lives on for years, if not for decades.  As such we cannot simply address encryption algorithm obsolescence overnight. Asif Qayyum, Managing Director, Digital Security Risk & Controls at PwC Canada said that the industry is aware Q-Day is arriving if not already arrived. We need to prepare now because once the adversarial players crack the current encryption, it will be catastrophic. Here is a link to his full video: https://youtu.be/EdpRwnx5a58

This is why we’ve built IronCAP™, the solution to combat this threat.  IronCAP™ is the first-to-market a quantum-safe encryption solution, that is proven secure and readily available today.  And together with Thales we are confident we can reach a wider audience of businesses, organizations and government agencies, providing them with quantum-safe solutions that can help them to achieve cyber resilience.

Becoming quantum-safe 1-year-too-early or 1-year-too-late is everything.  Join top cybersecurity professionals to become quantum-safe with IronCAP™ and Thales today.