CISA Urges Organizations to Take Security Measures for Quantum Computers

August 29, 2022

The Cybersecurity and Infrastructure Security Agency (CISA) has called on organizations to prepare for the new era, in particular the introduction of security measures for quantum computers.

The agency called on technology leaders to prepare for migration to stronger security systems, explore risk mitigation methods and help develop new standards.

Quantum computing is the future, and while organizations are already implementing various structures to make it realistic and accessible, it is also important that this technology tool is supported with the highest level of security to prevent it from being exploited by attackers.

Although research on quantum-secure encryption algorithms is still ongoing, CISA advises organizations to follow the “post-quantum cryptography roadmap,” which includes the need for CEOs to step up their engagement with organizations working on post-quantum standards.

Organizations must also keep an inventory of the most sensitive and critical data sets that need to be safeguarded over a longer period of time.

Organizations must conduct an inventory of all systems that use cryptographic technology for each function, as this will help to facilitate a smooth transition in the future.

Cybersecurity officials within organizations should identify acquisition, cybersecurity, and data security standards that need to be updated to meet quantum-building requirements.

Organizations must identify where and for what purpose public key cryptography is being used and mark those systems as quantum vulnerable.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

February 23, 2026 Researchers say they’ve identified a new strain of Android malware that uses Google’s own Gemini AI model more...

February 23, 2026 Texas officials are warning about what could be the largest data breach in U.S. history, with notification more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn