The quantum security quandary
Businesses need to get ‘crypto-agile’ to win the quantum arms race
Quantum computing is an inevitable technology, with the private sector and nation-states racing to be the first to unlock its potential. While it can be used for all kinds of good, quantum computing could also be used to unravel critical systems.
One of the most common ways to protect data is to encrypt it using an RSA algorithm. In simple terms, it relies on the fact that while you can easily multiply one prime number by another, it’s very hard to work out prime factors from any given number. Quantum computing could make this much easier, allowing criminals to decrypt sensitive data.
The UK is among a number of nations investing in quantum computing, with the government having recently announced £900 million for exascale quantum computer. Stakes are high as we enter into what some have dubbed a ‘quantum arms race’, with the first to successfully crack encryption holding all the cards when it comes to its myriad use cases.
In this episode, Rory and Jane speak to Tim Callan, chief experience officer at cyber security firm Sectigo, about the current state of quantum computing research and how the industry can prepare for this seismic shift.
Highlights
“Think about those industrial secrets that, let's say, another nation-state might want to take away. Think about those military secrets, think about the plans for the stealth fighter. Those are the things that are very, very valuable. And those are the things that we need to worry about most immediately.”
“When I talk to people about this, I often say quantum computers are no longer a science project, they are now an engineering project. And what I mean by that is there's no question that it will work, and it will be commercially viable, and it will be practical. It's just about figuring out how to really get them all tuned in the way we want them.”
“What you should be doing now is you should be making yourself crypto-agile. Which means you have the ability to change your cryptography as needed at will. And there are a few steps for crypto agility. One of them is inventory or cryptography. Amazingly, most enterprises can't even tell you what cryptography they have implemented, where it is, how it's being used, whether or not it meets current standards.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Footnotes
- What is quantum computing?
- What is the ‘steal now, crack later’ quantum computing threat?
- 2023 Spring Statement brings 'enhanced' tax incentives to tech SMBs
- Dell CTO: AI is nothing compared to the oncoming quantum storm
- Skills shortages could pose threat to UK’s quantum ambitions
- UK startup's Equinix deal marks step towards broad quantum computing access
- How quantum computing can fight climate change
Subscribe
- Subscribe to The IT Pro Podcast on Apple Podcasts
- Subscribe to The IT Pro Podcast on Google Podcasts
- Subscribe to The IT Pro Podcast on Spotify
- Subscribe to the IT Pro newsletter
- Subscribe to IT Pro 20/20

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
HPE and Nvidia launch first EU AI factory lab in FranceThe facility will let customers test and validate their sovereign AI factories
-
AWS CEO Matt Garman says AI agents will have 'as much impact on your business as the internet or cloud'News Garman told attendees at AWS re:Invent that AI agents represent a paradigm shift in the trajectory of AI and will finally unlock returns on investment for enterprises.
-
November rundown: CrowdStrike's insider threatITPro Podcast As CrowdStrike grappled with a malicious employee, Cloudflare suffered a major outage
-
Getting a grip on digital identityITPro Podcast As AI agent adoption explodes, security leaders will need better identity controls than ever before
-
Let’s talk about digital sovereigntyIn the age of AI and cloud, where data resides is a key consideration
-
Can cyber group takedowns last?ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data
-
July rundown: Salt Typhoon and SharePoint scaresITPro Podcast US public sector organizations are under serious threat from the state-backed hacking group
-
Can the UK ban ransomware payments?ITPro Podcast Attempts to cut off ransomware group profits could instead harm businesses
-
We need to talk about operational technologyITPro Podcast Groups like Volt Typhoon are abusing poor hygiene in critical infrastructure to pre-position for attacks
-
RSAC Conference 2025: The front line of cyber innovationITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event