Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Quantum-Safe Security Awareness Survey
Quantum-Safe Security Awareness Survey

Quantum-Safe Security Awareness Survey

Release Date: 01/26/2018

Working Group: Quantum-safe Security

Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant challenges must be overcome in order to realize a cryptographically useful quantum computer, the quantum computing community now believes this goal could be reached within the next 10 to 15 years. Therefore, cloud computing professionals need more information about the threats, including, of course, how to counteract them effectively. In order to fill the information gap, the QSS working group conducted a survey of CSA members about their overall awareness of quantum security risks and approaches to tackle these risks. The aim of this document is to share the most significant findings from the survey in order to identify areas of potential concern and action.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
AI Risk Management: Thinking Beyond Regulatory Boundaries
AI Risk Management: Thinking Beyond Regulatory ...
AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects
AI Organizational Responsibilities - Governance...
A Vulnerability Management Crisis: The Issues with CVE
A Vulnerability Management Crisis: The Issues with CVE
Published: 11/21/2024
CSA Community Spotlight: Addressing Emerging Security Challenges with CISO Pete Chronis
CSA Community Spotlight: Addressing Emerging Security Challenges wi...
Published: 11/18/2024
Threat Report: BEC and VEC Attacks Continue to Surge, Outpacing Legacy Solutions
Threat Report: BEC and VEC Attacks Continue to Surge, Outpacing Leg...
Published: 11/08/2024
Top IAM Priorities for 2025: Addressing Multi-Cloud Identity Management Challenges
Top IAM Priorities for 2025: Addressing Multi-Cloud Identity Manage...
Published: 10/30/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training