AI and Quantum: The Future of Cybersecurity

▼ Summary
– Quantum computing threatens current encryption standards by potentially breaking widely used public-key cryptography systems like RSA and Elliptic Curve.
– Organizations are urged to invest now in defenses capable of withstanding both AI and quantum attacks, as these threats are approaching faster than many realize.
– A zero trust cybersecurity approach, which assumes no inherent trust in users or devices and enforces continuous verification, is critical for building resilient defenses.
– AI is making cyberattacks more accessible, allowing less skilled hackers to exploit vulnerabilities and significantly impacting organizations already.
– Defending against AI-powered threats requires using AI to automate threat detection and response, modernizing systems to operate at machine speed.
While artificial intelligence is transforming the digital world, another powerful technology, quantum computing, poses a serious challenge to the security frameworks we rely on today. Quantum algorithms threaten to break the mathematical foundations of modern encryption, including widely used public-key systems such as RSA and Elliptic Curve cryptography. These systems protect everything from online communications and digital signatures to cryptocurrency transactions, making the arrival of quantum computers a pivotal moment for global security.
According to Peter Bailey, senior vice president and general manager of Cisco’s security business, “We know quantum is coming. Once it does, it will force a change in how we secure data across everything, including governments, telecoms, and financial systems.” He notes that while many organizations are understandably focused on immediate AI threats, quantum risks are advancing faster than people realize. Bailey emphasizes the importance of investing now in defenses capable of withstanding both AI-driven and quantum-powered attacks.
A zero trust approach to cybersecurity is central to building this resilience. This strategy operates on the principle that no user or device should be automatically trusted, whether inside or outside the network. By requiring continuous verification, zero trust enables real-time monitoring and ensures that any attempts to exploit system weaknesses are identified and addressed immediately. This technology-agnostic framework provides a strong defensive posture even as threats continue to evolve.
At the same time, AI is making it easier for cybercriminals to launch sophisticated attacks. Even individuals with limited technical skills or resources can now use AI tools to infiltrate networks, manipulate systems, and exploit minor digital vulnerabilities. Recent surveys show that nearly three-quarters of cybersecurity professionals report that AI-enabled threats are already significantly affecting their organizations, with 90% expecting such threats to increase over the next one to two years.
Bailey explains, “AI-powered adversaries have advanced techniques and operate at machine speed. The only way to keep pace is to use AI to automate response and defend at machine speed.” He stresses that organizations must modernize their systems, platforms, and security operations to enable automated threat detection and response. This shift reduces reliance on manual rule-writing and human reaction times, allowing defenses to adapt dynamically as IT environments change and criminal tactics grow more sophisticated.
(Source: Technology Review)
