Devoteam TechRadar 2023 Hot Topic – Trust and Cybersecurity
This article is a selection of the 2023TechRadar by Devoteam, it’s designed to introduce the context of the chapter by covering a hot topic in the industry. This year, the spotlight is on the Cloud Native era. In this era, technology and business become more connected than ever. Companies must adapt to disruptive models built with, in, and for the cloud. Most technologies in the 2023 Devoteam TechRadar align with this movement.
Addressing post-quantum cryptography risks
Imagine a future where quantum computers decrypt all data on the Internet. Organisations must start preparing now. Quantum computers could compromise current cryptography, impacting the digital economy’s trust and confidentiality. This could expose intellectual property and secure communications to potential threats. Electronic signatures, secure key exchanges, and Public Key Infrastructure-based authentication may face vulnerabilities. Secure messaging, websites, and VPNs might also become compromised.
Although quantum computers strong enough to break current cryptography are years away, organisations should act early. Those requiring long-term data protection should start assessing risks soon. The National Institute of Standards and Technology (NIST) is developing quantum-safe cryptography standards. They aim to release these standards by 2024. Planning now is crucial, as preparing for post-quantum cryptography can take several years.
Preparing for post-quantum cryptography
There are several approaches to creating quantum-resistant cryptosystems. However, finding the best one can be challenging. Organisations should use hybrid solutions that combine conventional and quantum-ready technologies. This approach maintains current security while integrating post-quantum cryptography techniques.
First, organisations need to assess their current cryptosystems. They should then develop a strategy that includes quantum resilience in their cybersecurity risk assessments. This strategy should involve the following steps:
- Raise awareness: Educate decision-makers and IT leaders about quantum-safe cryptography and its impact.
- Evaluate risks: Assess the organisation’s vulnerability to quantum-based cryptography threats.
- Provide strategic guidance: Prioritise quantum-safe initiatives according to risk, IT strategy, and supply-chain dependencies.
- Develop a migration plan: Move towards agile and quantum-safe cryptography to embrace flexible, modern approaches.
Managing the transition to post-quantum cryptography
Once strategic maturity is achieved, managing the transition is possible. Organisations should partner with solution providers offering cryptographic agility. This helps ensure a smooth migration path without collateral damage or lock-in issues.
By following these steps, organisations can build a strong plan. This will safeguard their data against future quantum computing threats.