Quantum computing is often described as the next great technological leap, but for cybersecurity professionals, it represents a looming challenge. The ability of quantum machines to break today’s encryption could force organizations to rethink their entire security foundation.
Through the Radware Link program, we asked members: “If quantum computers were mainstream tomorrow, which parts of your security strategy would you need to rethink, upgrade, or redesign first, and why?” The responses highlight both the urgency of preparing now and the opportunity to build stronger systems for the future.
Cryptography Under Siege
Radware Link members agreed that cryptography is the first and most urgent area at risk. Algorithms like RSA and ECC, which secure digital certificates, VPNs, and public key authentication, would be vulnerable to quantum attacks. Even hashing algorithms would see their strength reduced.
As Michael Reynolds, CISO at FinSecure Bank, put it:
“The post-quantum era is not a distant future possibility, but a reality that is rapidly approaching.”
The immediate response, many noted, is to begin migration to post-quantum cryptography (PQC): inventorying systems, implementing new algorithms, and adopting hybrid approaches that combine classical and quantum-safe methods during the transition.
NIST as a Roadmap
Several Radware Link members pointed to the importance of following standards such as those being defined by NIST. These guidelines provide a critical roadmap for moving beyond current PKI, digital signatures, and TLS/SSL channels.
Sophie Lambert, Head of Information Security at EuroTech Telecom, emphasized:
“Organizations that align now with NIST’s PQC standards will be in a much stronger position when quantum threats become real.”
Practical Action Steps
Some members offered a simple checklist for getting ready:
- Assess the data that needs to be migrated to quantum-safe encryption
- Evaluate threats and vulnerabilities
- Adopt or upgrade cryptographic technologies
- Define a clear crypto policy
- And, importantly, "stay informed"
These straightforward steps underline that while quantum computing can feel abstract, the preparation process can start today.
Beyond Technology: Transition and Compliance
Quantum readiness is not just about encryption. Radware Link members also raised the broader issue of managing the transition period. Legacy systems in banks, governments, and critical infrastructure cannot be updated overnight.
This creates a window of heightened risk, one where attackers may store encrypted data today to decrypt later with quantum capabilities (“harvest now, decrypt later”). It also raises new demands for auditing, compliance, and regulatory adaptation.
As David Chen, Security Manager at Global Bank, noted:
“Resilience depends not only on technology, but also on policies, processes, and governance.”
Common Threads
Despite the variety of perspectives, three common themes stood out from Radware Link members:
- Asymmetric cryptography is the first line of defense that must be rethought
- Transition strategies must follow emerging standards such as NIST's PQC roadmap
- The challenge extends beyond technology to compliance, risk management, and business continuity
Preparing for the Quantum Era
Quantum computing may not be mainstream yet, but the time to prepare is now. As Radware Link members remind us, this is not just a technological upgrade, it is a transformation in how we conceive and implement digital security.
The organizations that begin adapting today will be better equipped to face tomorrow’s challenges and to turn them into opportunities.
Learn more about Radware Link and get involved