Deep Dive Series

Long-form research across quantum technology and security

Multi-article series with capstone analyses, interactive tools, and companion databases.

Getting Started With Quantum Security & PQC Migration

Getting Started With Quantum Security

A practitioner’s roadmap from mandate to migration

Predicting Q-Day

Predicting Q-Day

Frameworks, forecasts, and the real deadline

CRQC Quantum Capability Framework

CRQC Capability Framework

Nine capabilities needed to break cryptography

China's Quantum Ambition

China’s Quantum Ambition

Could Beijing win the quantum race?

Quantum Computing Companies & Roadmaps

Quantum Computing Companies

60+ hardware companies profiled and compared

Articles & Analysis

Quantum Technologies, Security & Geopolitics

Mapping Dark Web SIM Swapping Economy

In the U.S. alone, SIM-swapping attacks resulted in $72 million worth of losses last year, four-million dollars more than 2021, according to the Federal Bureau of Investigation. In a 2022 public service announcement, the FBI defined SIM swapping as a ...

Cybersecurity Negligence and Personal Liability: What CISOs and Board Members Need to Know

“Could I personally be sued or fined if our company gets breached?” This uneasy question is crossing the minds of many CISOs and board members lately. High-profile cyber incidents and evolving regulations have made it clear that cybersecurity is not ...

The Skill Stack a CISO Needs for Crypto‑Agility and Quantum Readiness

The path to quantum readiness is navigable with the right combination of skills, planning, and proactive execution. By leveraging existing strengths - the people and processes you already have - an enterprise can evolve its cryptographic foundations without needing a ...

Quantum Security: Understanding the Terminology and Context

"Quantum security" is a term that is increasingly being used. With everyone having their own definition of the term. It can carry multiple meanings depending on context, but so do other related terms. The whole field is fairly new and ...

Upgrading Operational Technology (OT) Systems to Post‑Quantum Cryptography (PQC): Challenges and Strategies

Operational Technology (OT) environments, such as industrial control systems and critical infrastructure, are especially at risk due to their long-lived devices and infrequent updates. Many OT systems deployed today will still be in use a decade or two from now, ...

Verified Crypto Account Listings Proliferate on the Dark Web

Verified crypto-exchange accounts have become a hot commodity on the dark web, with login credentials available for as little as $20, according to May data from threat intelligence firm Privacy Affairs. But the price for verified crypto accounts has been ...

Taxonomy of Quantum Computing: Modalities & Architectures

A comprehensive field guide to every way humanity is trying to build a quantum computer — and why it matters that there isn't just one. This Deep Dive series surveys the full landscape of quantum computing modalities and architectures: from ...

Quantum Computing Modalities: Photonic Cluster-State

Photonic Cluster-State Computing is a form of quantum computing in which information is processed using photons (particles of light) that have been prepared in a highly entangled state known as a cluster state. It falls under the paradigm of measurement-based ...

Quantum Risk: The Coming Cryptography Reckoning

In a secure data center somewhere, an adversary is quietly stockpiling encrypted emails, financial transactions, and state secrets - betting that within a decade a new kind of machine will decrypt them in minutes. This scenario underpins what cybersecurity experts ...

Quantum Memories in Quantum Networking and Computing

Quantum memories are devices capable of storing quantum states (qubits) in a stable form without collapsing their quantum properties. In essence, a quantum memory is the quantum-mechanical analog of classical computer memory or RAM​ ...

Quantum LiDAR vs. Quantum Radar

Quantum radar and quantum LiDAR are no longer science fiction – they are emerging reality, albeit in early stages. They differ in technology and likely timelines: expect to hear more about quantum LiDAR in commercial products soon, while quantum radar ...

Quantum Computing Modalities: Ion Trap and Neutral Atom MBQC

Ion Trap and Neutral Atom implementations of MBQC leverage two leading “matter-qubit” platforms – trapped ions and ultracold neutral atoms – to realize this model. In a trapped-ion MBQC, a string of ions (charged atoms) is confined and entangled via ...

PostQuantum.com AI Explainer

An AI tool that answers questions using a curated corpus of information from PostQuantum.com, NIST, NSA, and ENISA and other reliable sources. Ask anything related to quantum computing or quantum security.