ESW #315 - Matt Johansen, Kayla Lee, Vadim Lyubashevsky

Published: May 5, 2023, 5:06 p.m.

Quantum computing is a rapidly emerging technology that harnesses the laws of quantum mechanics to solve problems that today\u2019s most powerful supercomputers cannot practically solve. IBM's Dr. Kayla Lee will explain how close we are to a computational quantum advantage: the point where a computational task of business or scientific relevance can be performed more efficiently, cost-effectively, or accurately using a quantum computer than with classical computations alone.

\xa0Segment Resources:

What is quantum computing? https://www.ibm.com/topics/quantum-computing

About IBM Quantum: https://www.ibm.com/quantum

About the IBM Quantum Development Roadmap: https://www.ibm.com/quantum/roadmap

Access and program a quantum computer: https://quantum-computing.ibm.com/

\xa0

Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break some of the most widely-used security protocols in the world. Dr. Vadim Lyubashevsky will discuss how quantum-safe cryptography protects against this potential future.

Segment Resources:

IBM Quantum Safe: https://www.ibm.com/quantum/quantum-safe

IBM scientists help develop NIST\u2019s quantum-safe standards: https://research.ibm.com/blog/nist-quantum-safe-protocols

Government and industry experts recommend moving to quantum-safe cryptography: https://research.ibm.com/blog/economist-quantum-safe-replay

\xa0

We're talking with Matt Johansen about his new newsletter, Vulnerable U. We'll discuss his journey from vendors to massive enterprises to less massive enterprises and what he's learned about InfoSec along the way. Like us, Matt has some strong takes on many InfoSec topics, so this conversation could go down many paths. Regardless, we're excited about the journey and the destination with this interview.

Subscribe to [Vulnerable U] https://link.mail.beehiiv.com/ss/c/CygrK4bVgDWxdDLo_7X0UUe8u_TcBPAeAQlRvYdH5hN2mTxFi32BUXbh9K9a2mS8ILJXWKo4rmayv53niV3c6NrsGo7UAp6yFd9EScNQoNwURBhep7S6sIyNBsEMNJ7Z/3v8/6L9W-AB2Sx6Ts9cCBWFiYw/h9/mYsvCYdHno82QRYGHJuyaUZtu8PbgH5PWFi3mLY1CNg\xa0

\xa0

Visit https://www.securityweekly.com/esw\xa0for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

\xa0

Show Notes: https://securityweekly.com/esw315\xa0