Biden Signs Quantum Cyber Security Act

US President Joe Biden has on 21st of December now signed the Quantum Computing Cybersecurity Preparedness Act into law. The legislation is designed to secure the federal government’s systems and data against quantum-enabled data breaches. 

The law is designed to secure the federal government systems and data against the threat of quantum-enabled data breaches, ahead of ‘Q Day’, the point at which quantum computers are able to break existing cryptographic algorithms. 

The act was co-sponsored by Republican Senators Rob Portman and Democrat Senator Maggie Hassan and is a bipartisan act that introduces a number of obligations on federal agencies to prepare for more security cryptography in the face of the threat of quantum computing. 

These include requirements to maintain inventories of information technology, migrating iT systems, and more. The requirements must be completed within six months of the law being enacted, which will occur over 2023. Additionally, within one year of the National Institute of Standards and Technology (NIST) issuing post-quantum cryptography standards, the Office of Management and Budget (OMB) will publish guidance requiring federal agencies to prioritise IT systems for migration to post-quantum cryptography. The agencies will then have to develop a plan for the migration.

Experts believe quantum computing will advance to this stage in the next five to 10 years, potentially leaving all digital information vulnerable to cyber-threat actors under current encryption protocols.

In August 2022, CISA published guidelines to help organisations’ transition to post-quantum cryptography.
In November the White House gave federal agencies until May 4 next year to provide an inventory of assets containing cryptographic systems that could be cracked by quantum computers.

White House:    CISA:    QuantumInsider:      FedScoop:      Infosecurity Magazine:   Dark Reading:    Oodaloop

You Might Also Read: 

Quantum Computing Raises As Many Problems As It Solves:

 

« 2023 Tech Predictions
Security Risks In 5G Mobile »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

PlaxidityX

PlaxidityX

PlaxidityX (formerly Argus Cyber Security) is a global leader in mobility cyber security, provides DevSecOps, vehicle protection and fleet protection technologies and services.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

National Cybersecurity and Communications Integration Center (NCCIC) - USA

National Cybersecurity and Communications Integration Center (NCCIC) - USA

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

Symantec

Symantec

Symantec delivers data-centric hybrid security for the largest, most complex organizations in the world – on devices, in private data centers, and in the cloud.

Senserva

Senserva

Senserva delivers a deep analysis for security user accounts and applications within the Microsoft cloud environment.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.