Attackers don’t need a quantum computer to start winning with quantum. They just need time. That premise – that adversaries can siphon encrypted data today and hold it until tomorrow’s decryption becomes possible – framed the conversation in “Cybersecurity in Focus: Acting Today Against Tomorrow’s Threat,” a Red Hat Government Symposium session. […]
