When I tell fellow CISOs, board members, or even seasoned program managers that the integrated program plan for a comprehensive quantum security / post-quantum cryptography (PQC) migration I recent...
No, the “Pinnacle Architecture” Is Not Bringing Q-Day Closer 2-5 Years (but It Is Credible Research)
Since the preprint paper of The Pinnacle Architecture preprint hit and its Quantum Insider coverage ran, my phone has been ringing off the hook.
The question behind most of those calls is simple: ...
On 20 January 2026, the European Commission published COM(2026) 13 final - a proposed directive amending NIS2 as part of a broader cybersecurity simplification package tied to the upcoming Cybersec...
A team at the University of Science and Technology of China (USTC) published a paper in Science that quietly redrew the map of what device-independent quantum key distribution (DI-QKD) can do. Led ...
India’s Department of Science and Technology (DST) published the “Implementation of Quantum Safe Ecosystem in India – Report of the Task Force.” This report, produced by a national Task Force under...
Hong Kong’s central bank unveils a “Quantum Preparedness Index” to gauge how ready its banks are for the quantum computing era, underscoring a global push among regulators to future-proof financial...
Today, a sea change is underway. Quantum Open Architecture (QOA) is doing for quantum computing what the PC revolution did for classical computing - opening up the ecosystem. Just as the computing ...
The Cybersecurity and Infrastructure Security Agency (CISA) released a definitive advisory titled "Product Categories for Technologies Use Post-Quantum Cryptography Standards." This document, manda...
At its core, quantum sovereignty means having full control over the critical layers of quantum technology domestically - the ability to design, manufacture, and operate quantum systems without exte...
