Deep Dive Series

Long-form research across quantum technology and security

Multi-article series with capstone analyses, interactive tools, and companion databases.

Getting Started With Quantum Security & PQC Migration

Getting Started With Quantum Security

A practitioner’s roadmap from mandate to migration

Predicting Q-Day

Predicting Q-Day

Frameworks, forecasts, and the real deadline

CRQC Quantum Capability Framework

CRQC Capability Framework

Nine capabilities needed to break cryptography

China's Quantum Ambition

China’s Quantum Ambition

Could Beijing win the quantum race?

Quantum Computing Companies & Roadmaps

Quantum Computing Companies

60+ hardware companies profiled and compared

Articles & Analysis

Quantum Technologies, Security & Geopolitics

Quantum Sensing – Introduction and Taxonomy

Quantum sensing is poised to augment and in some cases revolutionize how we measure the world. Its unique ability to leverage fundamental quantum phenomena – superposition, entanglement, and more – means it can achieve what was once thought impossible: detecting ...

Cryptographically Relevant Quantum Computers (CRQCs)

Cryptographically Relevant Quantum Computers (CRQCs) represent a seismic shift on the horizon of cybersecurity. In this article, we’ve seen that CRQCs are defined by their ability to execute quantum algorithms (like Shor’s and Grover’s) at a scale that breaks the ...

Gradient-Based Attacks: A Dive into Optimization Exploits

Gradient-based attacks refer to a suite of methods employed by adversaries to exploit the vulnerabilities inherent in ML models, focusing particularly on the optimization processes these models utilize to learn and make predictions. These attacks are called “gradient-based” because they ...

Quantum Computer Factors Record 48-Bit Number – How Far Are We from Cracking RSA-2048?

Factoring a 2048-bit number is in a different universe of complexity, requiring thousands of high-quality qubits and billions of operations – a capability that will likely require years of additional scientific and engineering breakthroughs. The current milestone, while remarkable for ...

Neven’s Law: The Doubly Exponential Surge of Quantum Computing

In 2019, Google’s Quantum AI director Hartmut Neven noticed something remarkable: within a matter of months, the computing muscle of Google’s best quantum processors leapt so quickly that classical machines struggled to keep up. This observation gave birth to “Neven’s ...

Engaging and Managing Vendors for Quantum Readiness

Vendors provide critical software, cloud platforms, fintech solutions, IoT devices, and more - and these often rely on vulnerable cryptographic algorithms under the hood. If a key vendor lags in upgrading their encryption, it could expose your data or systems ...

How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security Operations (SOC)

This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical for node operators, smart contract developers, and end users. In many ways, Security Operations Center (SOC) ...

Introduction to AI-Enabled Disinformation

In recent years, the rise of artificial intelligence (AI) has revolutionized many sectors, bringing about significant advancements in various fields. However, one area where AI has presented a dual-edged sword is in information operations, specifically in the propagation of disinformation ...

The Unseen Dangers of GAN Poisoning in AI

GAN Poisoning is a unique form of adversarial attack aimed at manipulating Generative Adversarial Networks (GANs) during their training phase; unlike traditional cybersecurity threats like data poisoning or adversarial input attacks, which either corrupt training data or trick already-trained models, ...

“Magical” Emergent Behaviours in AI: A Security Perspective

Emergent behaviours in AI have left both researchers and practitioners scratching their heads. These are the unexpected quirks and functionalities that pop up in complex AI systems, not because they were explicitly trained to exhibit them, but due to the ...

Entanglement Distribution Techniques in Quantum Networks

Quantum entanglement is a unique resource that enables new forms of communication and computation impossible with classical means. Distributing entanglement between distant locations is essential for applications such as quantum key distribution (QKD), quantum teleportation, and connecting quantum computers for ...

Can we afford to keep ignoring Open RAN security?

I’m skeptical of ‘futurists’. Work closely enough with the development of technology solutions and you’ll know that the only certain thing about the future is that it’s constantly changing. For example, few ‘futurists’ predicted the Covid-19 outbreak that brought the ...

PostQuantum.com AI Explainer

An AI tool that answers questions using a curated corpus of information from PostQuantum.com, NIST, NSA, and ENISA and other reliable sources. Ask anything related to quantum computing or quantum security.