Deep Dive Series

Long-form research across quantum computing and quantum security

Multi-article series with capstone analyses, interactive tools, and companion databases.

Quantum Systems Integration

Open architecture, modular hardware, and building quantum computers from components


How to Build a Quantum Computer
How to Build a Quantum Computer

Integration guides for assembling quantum computers from modular components. Every major modality covered, from empty lab to first qubit signal, with vendor landscapes and procurement guidance.


What It Takes to Build a Quantum Computer
What It Takes to Build a QC

From qubit fabrication through cryogenics, control electronics, and error correction. A component-level breakdown of the supply chain and engineering challenges at each layer.


Quantum Systems Integration & QOA
Quantum Systems Integration & QOA

The Quantum Open Architecture model and multi-vendor system design. How independent integrators assemble best-of-breed components into working quantum computers.


Quantum Computing Modalities
Quantum Computing Modalities

Superconducting, trapped ion, neutral atom, photonic, silicon spin, and beyond. Every major hardware approach compared on performance, scalability, and commercial readiness.

Quantum Security, PQC Migration & Q-Day

Threat assessment, standards, mandates, migration frameworks, and deadlines


CRQC Quantum Capability Framework
CRQC Capability Framework

The nine engineering capabilities required to build a cryptographically relevant quantum computer. The structured, evidence-based method behind my Q-Day estimates.


Predicting Q-Day
Predicting Q-Day

Frameworks, forecasts, and the data behind competing timelines. Includes the interactive CRQC Readiness Benchmark tool for exploring estimates with your own assumptions.


Getting Started With Quantum Security & PQC Migration
Getting Started With Quantum Security

A practitioner’s roadmap from first awareness to active PQC migration. Covers threat assessment, NIST standards, the PQC Migration Framework, and how to build a business case.


Quantum Security Reference
Quantum Security Reference

Essential concepts for security leaders encountering quantum threats for the first time. Algorithms, attack models, and terminology explained without the hype.


PQC Governance: Program Leadership
PQC Governance & Program Leadership

Who leads PQC migration, how boards govern it, how to fund and execute it. A seven-part Deep Dive for CISOs, boards, and transformation leaders.


Global PQC Migration Timelines
Global PQC Migration Timelines

PQC deadlines are now set across 15+ countries. Maps every mandate, tracks where national requirements diverge, and identifies the compliance gaps that catch multinationals off guard.


CNSA 2.0: NSA's Post-Quantum Requirements
CNSA 2.0 Deep Dive

NSA’s post-quantum cryptography requirements decoded. Required algorithms, enforcement timelines, defense contractor compliance, and what CNSA 2.0 means beyond the NSS.


Quantum Threat to Cryptocurrencies
Quantum Threat to Cryptocurrencies

Ten-article series covering quantum resource estimates for breaking Bitcoin and Ethereum, protocol-level fixes, governance bottlenecks, and realistic migration roadmaps.

More Deep Dives


Quantum Sovereignty
Quantum Sovereignty

Strategic independence in the quantum era. Supply chain dependencies, export controls, and why national quantum strategies are reshaping technology geopolitics.


The Quantum Utility Map
The Quantum Utility Map

What will fault-tolerant quantum computers actually do? Application areas mapped by qubit requirements, timeline to viability, and projected economic impact.


China's Quantum Ambition
China’s Quantum Ambition

Could Beijing win the quantum race? China’s national programs, research output, industrial ecosystem, and the strategic implications for the West.


Quantum Computing Companies & Roadmaps
Quantum Computing Companies

60+ quantum hardware companies profiled and compared across modalities, funding, technical milestones, and commercial readiness. Updated quarterly.


Quantum Snake Oil Dictionary
Quantum Snake Oil Dictionary

A field guide to quantum hype, scams, and misused terminology. Spot exaggerated claims, decode marketing language, and separate real progress from noise.

Articles & Analysis

Quantum Computing, Quantum Security, PQC & Quantum Sovereignty

Post-Quantum Deadlines Are Likely About to Compress. Here’s What I’m Seeing.

Governments spent 2025 publishing PQC roadmaps. In 2026, they started giving those roadmaps teeth. A draft US executive order, the EU's first binding PQC law, and vendor deadlines from Google and AWS are collapsing the compliance horizon from 2035 to ...

Every Quantum Salary Guide I’ve Seen Is Fake. Here’s How I Proved It.

Recruitment agencies are flooding the market with "benchmarked" quantum salary data. I reverse-engineered the numbers in five different guides. Every single one was built from a formula, not from actual placement data ...

Quantum Radar Is Dead. The Physics Was Never There.

Fifteen years and over a hundred papers later, the verdict on quantum radar is in. The maximum range is limited to tens of meters by physics, not engineering. My earlier coverage was too generous ...

“They’ll Just Rent One”: The Quantum Threat Model Nobody Bothered to Check

Every article about quantum threats includes the throwaway line: criminals won't need their own quantum computer, they'll just rent one. The actual evidence says otherwise ...

PQC Governance: Who Should Lead Your Post-Quantum Migration, and How to Structure the Program

PQC migration is the most complex cryptographic transformation in enterprise history. Getting the governance model right determines whether it succeeds or stalls. Here's how to structure it ...

NIST Narrows the Field: Nine Post-Quantum Signature Candidates Advance to the Third Round

NIST just narrowed 14 post-quantum signature candidates to nine. The survivors span four distinct mathematical families, from isogeny-based compact signatures to multivariate schemes under active cryptanalytic fire. Here's what each candidate is, why NIST kept it, and what this means ...

The 2027 Procurement Gate: Why CNSA 2.0 Compliance Starts Now

January 1, 2027 is when CNSA 2.0 stops being guidance and becomes a procurement gate. Combined with the FIPS 140-2 sunset in September and CMMC enforcement in November, it creates a five-month compliance squeeze that cannot be solved by urgency ...

CNSA 2.0: The Complete Guide to NSA’s Post-Quantum Requirements

The definitive vendor-neutral reference to NSA's Commercial National Security Algorithm Suite 2.0 — the most operationally specific post-quantum cryptography mandate in the world. This guide breaks down every component of CNSA 2.0 in one place: the complete algorithm suite with ...

CNSA 2.0 vs. the World: Navigating Diverging Global PQC Requirements

The world's major cryptographic authorities agree that post-quantum migration is necessary. They disagree on nearly everything else: which algorithms, which parameter levels, whether hybrid is mandatory, and whether NIST's standards are sufficient ...

CNSA 2.0 for the Defense Industrial Base

CNSA 2.0 applies to National Security Systems. The requirements cascade to every prime contractor, sub-tier supplier, and commercial vendor selling into classified environments — arriving alongside CMMC 2.0 enforcement and a FIPS 140-3 validation bottleneck ...

CNSA 2.0 Beyond NSS: Why Financial Services Is Adopting It Anyway

CNSA 2.0 technically applies only to National Security Systems. In practice, its algorithm choices are appearing in financial services procurement language, board-level risk assessments, and counterparty due diligence — creating a de facto standard for high-assurance cryptography far beyond its ...

The SLH-DSA Exclusion: Why NSA Left Out NIST’s Conservative Fallback

NSA excluded NIST's hash-based signature algorithm from CNSA 2.0 and stated it does not plan to add future post-quantum standards. The decision reveals how NSA thinks about lattice security, operational simplicity, and the trade-offs that other national authorities resolve differently ...

PostQuantum.com AI Explainer

An AI tool that answers questions using a curated corpus of information from PostQuantum.com, NIST, NSA, and ENISA and other reliable sources. Ask anything related to quantum computing or quantum security.