Quantum Networks

Quantum Teleportation

Introduction

Quantum teleportation is a process by which the state of a quantum system (a qubit) can be transmitted from one location to another without physically sending the particle itself​. First proposed theoretically in 1993 by Charles Bennett and colleagues​, quantum teleportation exploits the phenomenon of quantum entanglement to transfer an unknown quantum state via a combination of entangled qubits and classical communication. In 1997, the first experimental demonstration confirmed that a photon’s polarization state could indeed be teleported between two labs, marking a milestone in quantum information science​. Since then, quantum teleportation has become a foundational method in quantum communication, envisioned as a building block for quantum networks and even quantum computing​. In essence, it provides a way to transfer quantum information securely and instantaneously (in principle) across distance – with the crucial caveat that a couple of classical bits must be sent, preserving causality. This unique capability has placed quantum teleportation at the heart of designs for a future quantum internet and next-generation secure communication infrastructures.

Fundamentals

Quantum teleportation relies on entanglement – the “spooky action at a distance” that Albert Einstein skeptically noted. When two qubits are entangled, their states become correlated such that measuring one instantaneously determines the state of the other, no matter how far apart they ar​e. The strongest form of entanglement between two qubits is represented by the four Bell states (also known as EPR pairs). These four states form an orthonormal basis for two-qubit systems and are maximally entangled. In Dirac notation, the Bell states are given by​:

  • $$|\Phi^+\rangle = \frac{1}{\sqrt{2}}\big(|00\rangle + |11\rangle\big)$$
  • $$|\Phi^-\rangle = \frac{1}{\sqrt{2}}\big(|00\rangle – |11\rangle\big)$$
  • $$|\Psi^+\rangle = \frac{1}{\sqrt{2}}\big(|01\rangle + |10\rangle\big)$$
  • $$|\Psi^-\rangle = \frac{1}{\sqrt{2}}\big(|01\rangle – |10\rangle\big)$$

Each Bell state describes two qubits with perfectly anti-correlated or correlated outcomes. For example, in the $$|\Phi^+\rangle$$ state, if one qubit is measured and found in state $$|0\rangle$$, the other qubit will always be measured in $$|0\rangle$$ as well (and likewise both will be $$|1\rangle$$). These entangled pairs are the essential resource for teleportation. Before any teleportation can occur, the communicating parties must share an entangled qubit pair. Bell states are typically the target entangled states used because of their symmetric, maximal entanglement properties.

Once an entangled pair (say qubits A and B) is distributed between a sender (Alice) and a receiver (Bob), Alice can teleport an unknown quantum state $$|\psi\rangle$$ (carried by some qubit $$Q$$) to Bob by following a specific sequence of operations. The teleportation protocol can be summarized in a few steps:

  1. Entanglement Sharing: Alice and Bob begin by each holding one qubit of an entangled pair prepared in a Bell state. For instance, qubit A (with Alice) and qubit B (with Bob) may be entangled in the state $$|\Phi^+\rangle_{AB}$$. This shared entanglement is a prerequisite for teleportation​.
  2. Bell Measurement: Alice then takes the qubit $$Q$$ whose state $$|\psi\rangle$$ is to be teleported and performs a joint measurement on $$Q$$ and her entangled qubit $$A$$. This joint measurement projects the two-qubit system $$(Q,A)$$ onto one of the four Bell states (a Bell state measurement, or BSM). Essentially, Alice collapses her two qubits into an entangled state, decoupling Bob’s qubit in the process. The outcome of this Bell measurement yields two classical bits of information, identifying which of the four Bell states was obtained. Notably, as a result of this measurement, Alice’s original qubit $$Q$$ is now destroyed – the unknown state $$|\psi\rangle$$ no longer exists in Alice’s lab (preventing any copy from remaining, in accordance with the no-cloning theorem).
  3. Classical Communication: Alice transmits the two-bit result of her Bell measurement to Bob over a classical communication channel (e.g. a standard internet or phone line). These two bits carry the crucial information of how Bob’s qubit has been affected by Alice’s measurement. No quantum information is in these bits – they are purely classical, but they are indispensable. This requirement of sending two classical bits ensures that there is no possibility of superluminal (faster-than-light) information transfer; the teleportation is only completed once Bob receives this classical message​.
  4. State Reconstruction: Using the information from Alice, Bob applies the appropriate unitary operation to his qubit $$B$$ to recover the state $$|\psi\rangle$$. Depending on which Bell state Alice found, Bob might need to do nothing, or apply a bit-flip ($$X$$), phase-flip ($$Z$$), or both ($$XZ$$) to his qubit. Upon this operation, Bob’s qubit $$B$$ collapses into the exact state $$|\psi\rangle$$ that $$Q$$ had initially. In other words, the unknown quantum state has now appeared on Bob’s side, and Alice’s original particle has no remaining trace of that state. Importantly, the quantum state reappears “encrypted” on Bob’s side until he uses the classical bits to correct it – only then does the teleported state fully materialize​.

Through this protocol, the quantum information carried by $$|\psi\rangle$$ has been transferred from Alice to Bob without any direct quantum transmission of the particle $$Q$$ itself. The entangled pair shared beforehand was consumed in the process (the entanglement is used up to carry the information). The end result is as if the qubit $$Q$$ has been transported to Bob: whatever state $$|\psi\rangle$$ was (which Alice did not need to know), Bob’s qubit now holds that state, and $$Q$$ is left in a useless measured state. Teleportation succeeds with 100% theoretical fidelity if the entangled pair and operations are ideal; however, it does not happen “magically” – it strictly obeys physics by requiring two classical bits to be sent. This ensures no violation of relativity (no instantaneous communication of usable information) and guarantees that if anyone tries to eavesdrop or interfere with the entanglement or classical channel, the teleportation will fail or be detected. In short, quantum teleportation leverages entanglement and classical communication to transport quantum states intact, forming the basis of many advanced quantum communication schemes.

Quantum Teleportation in Quantum Networks

In emerging quantum networks, quantum teleportation plays a central role as the method for moving quantum information across nodes. Unlike classical networks which send bits through wires or fiber, a quantum network distributes entanglement to connect distant nodes. The “pipes” of a quantum network are entangled qubit pairs shared between nodes, and teleportation is the protocol that uses those entangled pairs to actually send quantum states from one node to another. This enables remote quantum devices – such as quantum computers, sensors, or memory nodes – to exchange qubits without those qubits physically traversing the intervening distance. In effect, teleportation turns entanglement into a transport for quantum data, “networking” quantum processors in a way analogous to how classical networks exchange bits​. As I noted before, “entanglement between remote qubits allows quantum information to be transmitted via teleportation, effectively ‘networking’ quantum processors.“​

One immediate application in networks is to defeat loss and signal degradation. In a conventional optical fiber, photons carrying quantum states (for example, in QKD systems) can be lost or attenuated over long distances, limiting direct transmission range. Teleportation offers a way around this: by using pre-shared entanglement and only sending classical bits (which can be reliably transmitted or relayed), the quantum state can be transferred without the photon itself traveling the whole way. In fact, researchers have shown that teleporting the state of a qubit across a network can effectively bypass the usual transmission losses. A recent Nature study of a three-node quantum network in the Netherlands highlighted that “quantum teleportation allows for the reliable transfer of quantum information between distant nodes, even in the presence of highly lossy network connections”​. This makes teleportation highly desirable for a future quantum Internet, as it can extend quantum communication far beyond the point-to-point distance limits of photons in fiber or free space.

Entanglement Distribution and Swapping

Implementing teleportation on a network requires distributing entangled pairs to the right parties. In simple cases, a direct fiber link or a satellite can create an entangled photon pair and deliver one photon to Alice and the other to Bob. For longer distances or multi-hop networks, more sophisticated techniques like entanglement swapping are used. Entanglement swapping is essentially teleportation of entanglement itself – it allows two particles that never interacted to become entangled via intermediate nodes​. In a network, an intermediate node (say, Bob) might share an entangled pair with Alice and another pair with Charlie. If Bob then performs a Bell state measurement on his two qubits (one from each pair), Alice’s and Charlie’s qubits become entangled, even though they were never in contact​​. Bob’s measurement “swaps” the entanglement, extending it outward. This mechanism is the backbone of quantum repeaters that enable multi-hop quantum communication across many nodes. By chaining multiple swapping operations, one can distribute entanglement over arbitrarily long distances, one segment at a time​. Notably, this process does not require trusting the intermediate nodes with the actual quantum information – the entanglement is extended without those nodes learning anything about the final teleported state. Thus, entanglement swapping + teleportation provide a way to connect distant network nodes as if they share a direct entangled link, which is critical for scalability.

Using these techniques, scientists have begun to construct rudimentary quantum networks. In 2021, a team at QuTech (Delft University) demonstrated a three-node network (Alice–Bob–Charlie) in which quantum teleportation was achieved between non-neighboring nodes that had no direct physical link. In this experiment, entanglement was first distributed between Alice–Bob and Bob–Charlie, and then an entanglement swap at Bob allowed Alice and Charlie – who never interacted directly – to share entanglement. Once that entangled link was established, the state of a qubit at one end (Alice) was teleported to the other end (Charlie) through the network. This marked the first teleportation across a multi-hop quantum network, a significant step toward a scalable quantum internet​​. The achievement underscores how quantum teleportation underpins quantum networking: it is the transaction by which qubits are delivered across the network. In fact, in a fully realized quantum internet, the primary task of the network will be to distribute entangled pairs to users on demand (often called Entanglement-as-a-Service), and teleportation will be the standard protocol those users employ to send quantum states or “messages” using the shared entanglement​. In summary, without teleportation, a quantum network would be unable to transfer quantum information between nodes in any practical way – it is the linchpin that turns static entanglement connections into useful communication channels.

Cybersecurity Implications

The advent of quantum teleportation-based communication promises profound changes – and challenges – for cybersecurity. Quantum teleportation can impact secure communications both directly, by enabling fundamentally secure quantum channels, and indirectly, by altering the threat landscape (for instance, through quantum-enhanced attacks or defenses). Here, we examine several angles of its cybersecurity impact, from encryption and key distribution to network resilience and potential vulnerabilities:

Unbreakable Keys and Quantum Cryptography

Quantum teleportation is closely related to quantum key distribution (QKD) and other quantum cryptographic protocols. While teleportation itself sends quantum states rather than encryption keys, the infrastructure that enables teleportation (entangled qubit pairs shared between distant parties) can equally be used to generate and share random keys with security guaranteed by the laws of physics.

In entanglement-based QKD schemes (such as the Ekert ’91 protocol), pairs of entangled photons are distributed to two parties, who then perform measurements to produce correlated random bits – these bits form a shared secret key that no eavesdropper can copy without disturbing the quantum correlations.

Teleportation adds another tool: rather than directly sending qubits through potentially lossy channels, one could teleport qubits that encode sensitive information or secret keys. Any attempt by an eavesdropper to intercept the qubit’s state in transit would be futile, because the quantum state isn’t traveling through the intervening space at all – it appears at the destination by virtue of entanglement and a classical signal. As a result, quantum communication via teleportation is intrinsically protected: an eavesdropper cannot steal the quantum information without either accessing one of the endpoints or tampering with the entangled resources. In practical terms, this means that encryption keys exchanged over a teleportation-based quantum link could be fundamentally secure against eavesdropping. If a hacker tried to intercept the classical bits sent during teleportation, they gain no advantage – those bits alone reveal nothing about the key’s quantum state. Meanwhile, any attempt to siphon the entangled particles (e.g. intercepting one photon of an entangled pair) would break the entanglement and be evident to the communicating parties (they would observe errors or loss of coherence). This guarantees detection of eavesdropping attempts. In fact, experts predict that a fully quantum network would be “vastly more secure, [with] no way for eavesdropping to occur without knowing that it’s happened.”​ This represents a paradigm shift from classical encryption – where a spy might copy data undetected – to quantum-secured communication, where spying fundamentally alters the data, thus exposing itself.

Quantum Key Distribution (QKD) Over Long Distances

One of the immediate cybersecurity benefits of teleportation-enabled networks is extending the range of QKD. Traditional QKD (e.g. BB84 protocol) is limited by optical fiber attenuation or line-of-sight distances – on the order of 100–200 km in fiber without a trusted repeater. Quantum teleportation and entanglement swapping can link together many shorter QKD segments into one long chain, without requiring any intermediate node to know the key.

Today’s real-world QKD networks often resort to trusted relay nodes, where keys are decrypted and re-encrypted at intermediate points – a clear security weak point since a relay operator or an intruder at that node could copy the key. Teleportation-based quantum networks aim to eliminate this vulnerability. Because teleportation can distribute qubits (and entanglement) end-to-end without exposing the quantum state at intermediate hops, it enables untrusted repeaters. All intermediate nodes perform only physical operations (like Bell measurements) and never have to read or store the secret information. A future quantum internet thus promises unconditional security based on physics, but only if the nodes between users are all quantum and untrusted, meaning no trusted intermediaries are needed​. The teleportation mechanism is what allows those nodes to pass along quantum correlations without ever learning the underlying data.

In summary, quantum teleportation will bolster QKD by (a) allowing keys to be shared over much longer distances (using entanglement swapping as repeaters) and (b) removing the need to trust network operators, since even compromised midpoints cannot steal a key that was never decoded at that location. Already, new QKD protocols leveraging entanglement (like the E91 protocol) have been designed, which would work naturally over teleportation-based networks​. In combination with one-time-pad encryption, such keys would enable provably unbreakable communication for governments, militaries, financial institutions, and anyone needing high-security links.

Network Resilience and Attack Resistance

Quantum teleportation provides inherent resilience against certain network attacks. Because the quantum data disappears from the sender and only reappears at the receiver, the information is never propagating through the network infrastructure in readable form. Even if an attacker compromises a router or fiber link in the middle of a quantum network, they cannot intercept the quantum state en route – there is no meaningful quantum signal traveling between the endpoints aside from the entangled pairs (which by themselves carry no user data until measured) and some classical bits. Those classical bits (the Bell measurement outcomes) carry no sensitive information about the quantum state without the context of the entangled qubit on the far end. This means that an adversary gaining access to the classical channel or an intermediate node cannot reconstruct the teleported state; at best they could disrupt the communication (denial of service), but not eavesdrop silently. Consequently, quantum teleportation yields communications that are exceptionally tamper-evident. If a malicious actor attempts to intercept or alter the process – say by measuring an entangled particle or injecting their own – the disturbance will be apparent as a loss of entanglement fidelity or a mismatch when verifying the teleported data.

Moreover, teleportation-based quantum secure communication can mitigate many known vulnerabilities of early QKD systems. Notably, several side-channel attacks on QKD exploit the physical hardware (blinding detectors with bright light, manipulating timing, etc.), which can sometimes fool a system into thinking no eavesdropping occurred when it actually did. Entanglement-based networks that use teleportation have different device requirements (for example, they may use entangled photon sources and Bell state analyzers rather than simple single-photon sources and detectors), potentially closing some of those loopholes. In fact, researchers have noted that using entanglement in Quantum Secure Communication helps overcome many of the implementation issues that plague QKD in practice​. For instance, since teleportation inherently requires a Bell measurement (a joint detection event) rather than independent detection of single photons, certain detector attacks may be less applicable. While no system is entirely immune to side-channels, the design of quantum teleportation systems adds layers of defense and fewer points where raw key material or quantum states are directly exposed to the environment.

Additionally, because teleportation uses classical channels for the two-bit announcement, standard IT security techniques (like authentication and encryption of that classical channel) can be layered on without weakening the quantum security. This ensures that an attacker cannot spoof the classical messages (which could otherwise cause Bob to apply a wrong operation and corrupt the teleportation). All these factors contribute to a highly resilient security posture: even if part of the network is compromised, the quantum data remains safe​. As an example, imagine a quantum network routing qubits through intermediate Node B. If Node B is malicious or hacked, it might try to intercept the qubits – but because those qubits are entangled with Node A and Node C, Node B measuring them will only destroy the entanglement and alert A and C that something is wrong (they’ll find their correlations gone). Crucially, Node B learns nothing about any secret state that was teleported between A and C, because that state never resided in B to begin with. This property – that even a compromised midpoint cannot access the quantum data – is a game-changer for secure network design​.

New Threats and Considerations

On the flip side, quantum teleportation and networks introduce new challenges for cybersecurity professionals. For one, the classical control systems and software orchestrating the quantum network become high-value targets. While the quantum info itself may be safe from eavesdropping, an attacker might seek to disrupt the entanglement distribution (e.g., jam the quantum channels with noise to prevent entanglement creation) or falsify signals to cause miscoordination. Denial-of-service attacks on quantum repeaters or entangled photon sources could degrade the network.

Ensuring the reliability and trustworthiness of quantum devices is another concern – a poorly manufactured “quantum router” might secretly leak information or have backdoors in the classical management interface. Thus, supply-chain security and rigorous testing will be as important as ever, even if the quantum protocols are theoretically secure.

There’s also the broader context: as quantum networks roll out, powerful quantum computers might become interconnected. If abused, a network of quantum computers could potentially collaborate to break classical cryptographic schemes faster (though post-quantum classical algorithms are being developed in parallel to counter this). Teleportation doesn’t inherently aid cryptanalysis, but the presence of quantum infrastructure could accelerate quantum attacks if misused.

On the defense side, one promising strategy is a hybrid approach: combining quantum-based security with classical post-quantum cryptography. For example, one could encrypt the classical channel (and any data) with post-quantum algorithms and use quantum teleportation/QKD for key exchange, achieving defense in depth. In fact, experts suggest using PQC and quantum secure comm (QSC) together as a layered solution. Such a combination means an attacker would have to break both the new quantum-based security and the classical algorithm to succeed​. This mitigates risks during the transition period when quantum networks are emerging and classical crypto is being upgraded.

Lastly, it’s worth noting that quantum teleportation doesn’t protect data stored at rest or in classical form – it secures data in transit. So, traditional cybersecurity practices (secure endpoints, authentication, access control, etc.) remain crucial. The teleportation-enabled quantum network is an amazingly secure pipeline, but one must still secure the faucets at each end.

In summary, quantum teleportation is poised to dramatically enhance the confidentiality and integrity of data transmissions, rendering many conventional eavesdropping methods obsolete. At the same time, it introduces new technical complexities and the need for robust quantum-classical integration in security policy. On balance, the consensus is that quantum teleportation will be a powerful boon for cybersecurity, enabling communication channels that are practically unhackable by today’s standards.

Future Outlook

Quantum teleportation is not only an experimental curiosity; it is on track to become a cornerstone of future secure communications. As research and development progress, we can anticipate several ways in which teleportation will shape the coming decades, along with challenges that must be overcome for large-scale deployment:

Scaling Up Quantum Networks: Thus far, quantum teleportation has been demonstrated over distances ranging from a few meters in a lab, to tens of kilometers in optical fiber, and even up to 1,400 km using satellite links​. The next big step is creating quantum repeaters and network architectures that can reliably teleport quantum information across continental or global distances on demand. A rough roadmap for achieving this involves improving each component of the entanglement distribution chain​​:

  1. High-Fidelity Quantum Repeaters: Researchers need to develop repeater nodes that can generate, store, and purify entangled pairs with high success probability. Entangled qubits are extremely susceptible to decoherence (loss of quantum integrity) over time and distance. Current quantum memory technologies can only hold entangled states for a short duration before they degrade. For long-distance teleportation, we require memories with longer coherence times or the use of quantum error correction to maintain entanglement over extended periods​. Additionally, each “hop” of teleportation (entanglement swapping) must succeed with high fidelity; otherwise, errors accumulate. Advancements in entanglement purification protocols will be necessary to filter out noise and ensure that end-to-end entanglement is of sufficient quality for teleporting quantum states with near-perfect accuracy.
  2. Improved Entanglement Generation Rates: To support many users and to send substantial amounts of quantum data (for instance, teleporting an entire quantum computer’s state or streaming qubits for quantum computing tasks), entanglement needs to be produced quickly and in parallel. Current experiments often take minutes to entangle a single pair over long distances. Future quantum networks will need to multiplex entanglement distribution – generating and managing many entangled pairs simultaneously – to achieve higher bandwidth. For example, if one wants to teleport large quantum states (multiple qubits or continuous streams), each qubit teleported consumes an entangled pair. Thus, the network must deliver entangled pairs at a high rate. Techniques like multiplexing different frequency channels of light, using many parallel photon sources, or quantum memory buffers for batching entanglement attempts are being explored to boost rates. A higher entanglement throughput directly translates to higher “quantum communication bandwidth.”
  3. Integration and Automation: Building a global quantum teleportation network will require that quantum hardware becomes far more robust and automated than it is today. Many of the impressive teleportation experiments are still confined to physics labs with careful, manual tuning. The future calls for turn-key quantum network devices – compact, stable photon sources, reliable quantum memories, and controllable quantum processors – that can be deployed in the field (potentially at repeater stations every 50–100 km or so for fiber networks)​. These devices must interface with existing fiber infrastructure or satellites, and handle day-to-day fluctuations (temperature changes, vibrations, etc.) with minimal human intervention. Projects like the Quantum Internet Alliance in Europe and similar initiatives in the U.S. are actively working on prototypes that bring together these technologies into testbed networks​. Over the next few years, we expect to see metro-scale quantum networks demonstrating repeated teleportation in real-world conditions, paving the way for larger scales.
  4. End-to-End Security and Trust Models: As discussed, one of the ultimate goals is a network that offers physics-guaranteed security without trusted nodes. Achieving this means every intermediate step must be quantum – from one end of the network to the other, information should only be in quantum or classical form, never requiring someone in the middle to decrypt a message. This will involve deploying teleportation (or entanglement swapping) at every network hop and carefully designing classical control channels to authenticate the Bell measurements and results. Robust quantum network protocols will need to handle if a node fails or is malicious (e.g., by routing entanglement around it, or by using redundant paths). The governance and standardization of a quantum internet also come into play: how do we certify that a given node or service is behaving quantum-honestly? Work on quantum network protocol stacks is underway to address authentication, routing, and error handling in a quantum context. Security will remain a driving concern – for instance, devising methods to securely connect users who do not directly trust each other via entangled networks (possibly using quantum analogues of certificate authorities or entanglement verification techniques). In the big picture, if these challenges are met, the payoff is extraordinary: communications protected by the very fabric of quantum physics, impervious to hacking in transit​.
  5. Towards a Quantum Internet: Many governments and companies have recognized the transformative potential of quantum networks. Significant investments are flowing into quantum communication R&D worldwide. The timeline often cited by experts suggests that in the next 5–10 years, we may see the first regional quantum networks with a few repeater hops (connecting say a few cities or a metro area), and in 10–20 years, a global quantum internet could emerge, spanning continents via fiber and satellite links. Early implementations might interconnect quantum computing clusters, enabling them to teleport quantum states to each other for load balancing or distributed computing. This would allow quantum computers to team up on problems, much like classical cloud computing, but via entanglement. As the technology matures, more applications will come to the forefront – for example, secure quantum networks for financial transactions, quantum sensor networks for enhanced GPS and clock synchronization, and so on. The long-term vision is that quantum teleportation could even allow for the concept of quantum cloud services: a user could prepare a qubit state locally and teleport it to a remote quantum server for processing, then teleport the result back – all with guaranteed privacy due to the nature of quantum info. It’s a bold vision, but each year brings new breakthroughs.

In conclusion, quantum teleportation is transitioning from a theoretical concept to a practical technology that will underpin the quantum networks of tomorrow. Its ability to transmit quantum states with perfect fidelity and built-in security properties addresses critical needs for protecting data against increasingly sophisticated threats (including future quantum computer attacks on classical crypto). There are certainly challenges ahead – improving the range, speed, and reliability of teleportation, and integrating it into existing communication ecosystems – but none appear insurmountable. With steady progress in quantum memory longevity, entanglement generation, and multi-node networking experiments, the pieces are falling into place. A fully realized quantum internet, empowered by quantum teleportation, could revolutionize secure communications. It would enable ultra-secure encryption through quantum key distribution on a global scale, ensure communications are immune to eavesdropping, and even allow distributed quantum computing tasks that today remain science fiction. As one physicist aptly put it, demonstrating quantum teleportation over long distances is “the basis of a fully quantum internet”, a technology likely to reshape the modern world​. The coming years will witness the continuing convergence of quantum physics and network engineering – and the result will be nothing short of a new era for cybersecurity and connectivity, with quantum teleportation at its core.

Marin Ivezic

I am the Founder of Applied Quantum (AppliedQuantum.com), a research-driven professional services firm dedicated to helping organizations unlock the transformative power of quantum technologies. Alongside leading its specialized service, Secure Quantum (SecureQuantum.com)—focused on quantum resilience and post-quantum cryptography—I also invest in cutting-edge quantum ventures through Quantum.Partners. Currently, I’m completing a PhD in Quantum Computing and authoring an upcoming book “Practical Quantum Resistance” (QuantumResistance.com) while regularly sharing news and insights on quantum computing and quantum security at PostQuantum.com. I’m primarily a cybersecurity and tech risk expert with more than three decades of experience, particularly in critical infrastructure cyber protection. That focus drew me into quantum computing in the early 2000s, and I’ve been captivated by its opportunities and risks ever since. So my experience in quantum tech stretches back decades, having previously founded Boston Photonics and PQ Defense where I engaged in quantum-related R&D well before the field’s mainstream emergence. Today, with quantum computing finally on the horizon, I’ve returned to a 100% focus on quantum technology and its associated risks—drawing on my quantum and AI background, decades of cybersecurity expertise, and experience overseeing major technology transformations—all to help organizations and nations safeguard themselves against quantum threats and capitalize on quantum-driven opportunities.
Share via
Copy link
Powered by Social Snap