Reimagining cybersecurity for artificial intelligence and quantum threats

Artificial Intelligence and quantum technologies are reshaping cybersecurity by accelerating attacks and threatening existing encryption. Organizations should adopt zero trust, harden models, and begin migrating to post-quantum defenses now.

Artificial Intelligence and quantum technologies are changing how defenders and adversaries operate, increasing the speed and scale of cyberattacks. The article describes how generative Artificial Intelligence can automate reconnaissance and produce tailored phishing at scale, while voice cloning tools can defeat authentication. Agentic Artificial Intelligence introduces autonomous systems that can reason, act, and adapt, enabling attacks that proceed without constant human oversight and potentially lowering the cost and complexity of sophisticated campaigns.

Survey data and industry perspectives underscore urgency. Nearly three quarters of cybersecurity professionals report that Artificial Intelligence-enabled threats already impact their organizations, and 90 percent expect such threats in the next one to two years. Cisco security executive Peter Bailey argues that defenders must apply Artificial Intelligence to automate detection and response at machine speed, modernize systems, and protect models and data against manipulation such as prompt injection. Nearly 40 percent of companies expect agentic Artificial Intelligence to augment teams within the next 12 months, with use cases including agents trained on telemetry to surface anomalies that humans cannot easily detect.

Quantum computing poses a parallel, longer-term risk by threatening the mathematical foundations of widely used public-key cryptography. The article highlights harvest now, decrypt later attacks in which adversaries stockpile encrypted data to break once quantum capabilities mature. A KPMG survey found that 73 percent of US organizations anticipate quantum-driven decryption threats, while 81 percent admit more could be done to secure data. Technology companies are already testing and deploying post-quantum cryptography, with examples including Apple’s PQ3 work on iMessage and Google’s testing of PQC in Chrome, and Cisco investing in quantum-proofing infrastructure.

The recommended defense posture centers on zero trust, which enforces continuous verification, minimizes access, and confines breaches. Practical steps include inventorying data and keys, rotating weak or outdated keys, planning migration to post-quantum algorithms, and integrating quantum-immune cryptography with Artificial Intelligence-powered analytics to detect complex patterns and automate real-time responses. Early investment and proactive planning are presented as essential to avoid being forced into reactive remediation when these threats materialize.

55

Impact Score

Inside the UK’s artificial intelligence security institute

The UK’s artificial intelligence security institute has found that popular frontier models can be jailbroken at scale, exposing reliability gaps and security risks for governments and regulated industries that rely on trusted vendors.

Siemens debuts digital twin composer for industrial metaverse deployments

Siemens has introduced digital twin composer, a software tool that builds industrial metaverse environments at scale by merging comprehensive digital twins with real-time physical data, enabling faster virtual decision making. Early deployments with PepsiCo report higher throughput, shorter design cycles and reduced capital expenditure through physics-accurate simulations and artificial intelligence driven optimization.

Cadence builds chiplet partner ecosystem for physical artificial intelligence and data center designs

Cadence has introduced a Chiplet Spec-to-Packaged Parts ecosystem aimed at simplifying chiplet design for physical artificial intelligence, data center and high performance computing workloads, backed by a roster of intellectual property and foundry partners. The program centers on a physical artificial intelligence chiplet platform and framework that integrates prevalidated components to cut risk and speed commercial deployment.

Contact Us

Got questions? Use the form to contact us.

Contact Form

Clicking next sends a verification code to your email. After verifying, you can enter your message.