{"id":2432,"date":"2025-12-08T07:11:51","date_gmt":"2025-12-08T15:11:51","guid":{"rendered":"https:\/\/celacampaindev.wpenginepowered.com\/?p=2432"},"modified":"2026-01-28T15:10:50","modified_gmt":"2026-01-28T23:10:50","slug":"preparing-for-the-quantum-unknown","status":"publish","type":"post","link":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/","title":{"rendered":"Preparing for the quantum unknown"},"content":{"rendered":"<h2 class=\"wp-block-heading has-body-2-xl-fluid-font-size\">How do you prepare for a risk that doesn&rsquo;t yet exist?<\/h2><p class=\"wp-block-paragraph\">That&rsquo;s the question we all face when it comes to quantum computing. No one&mdash;not even the scientists building them&mdash;can say precisely when a quantum supercomputer will become a reality, but we can bet that when they arrive some of our most sensitive data will be vulnerable. One day, a cryptographically relevant quantum computer (CRQC) could make short work of some of the complex mathematical calculations that are currently used to encrypt data&mdash;problems that would take classical computers millions of years to figure out.<\/p><p class=\"wp-block-paragraph\">The need for <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/blog\/2025\/08\/20\/quantum-safe-security-progress-towards-next-generation-cryptography\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"quantum-safe encryption\">quantum-safe encryption<\/a> is the primary cybersecurity challenge currently emerging from rapidly developing technology. Today&rsquo;s cryptography needs to be updated before someone builds a computer that can break it. But in the meantime, cyber thieves can scoop up massive amounts of data and simply wait for quantum technology to be able to break the cryptography&mdash;a threat known as &ldquo;harvest now, decrypt later.&rdquo; There is an immediate need to protect currently encrypted data that will still be sensitive when quantum computers can decrypt it.<\/p><p class=\"wp-block-paragraph\">Here, Kevin Reifsteck, Director for Cybersecurity Policy, and Emily Violi Benjamin, Senior Program Manager, Quantum Legal and Policy, break down what we know today about quantum safety. They explain the need for global standards, correct common misconceptions, and share practical tips for how organizations can prepare for the quantum future.<\/p><h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-large-fluid-font-size\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);font-style:normal;font-weight:600;line-height:1.3\">There are wildly different predictions for when quantum computers could be able to break certain types of encryption that are currently in use. Why is it so hard to know when this risk will become real?<\/h3><p class=\"wp-block-paragraph\"><strong>Emily Violi Benjamin:<\/strong> Building a utility-scale quantum computer involves doing things that have never been done in human history. It requires major advances across many types of technologies. At the same time, any timeline we set could be shortened by a leap forward in hardware or software development, so we need to keep our foot on the gas with the migration to post-quantum cryptography.<\/p><p class=\"wp-block-paragraph\"><strong>Kevin Reifsteck:<\/strong> That&rsquo;s especially important because of the &ldquo;harvest now, decrypt later&rdquo; risk, which is our biggest concern right now. It&rsquo;s critical to get started with the transition to quantum-safe cryptography now to protect data from people who want to steal it and hang onto it until quantum computers exist.<\/p><blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><figure class=\"wp-block-pullquote has-deep-blue-color has-text-color has-link-color wp-elements-3b7d1ad2cd4818c10abd58e848297d24\" style=\"margin-top:var(--wp--preset--spacing--md)\"><blockquote><p>A lot of data today is protected by &ldquo;public key encryption&rdquo;:<\/p><\/blockquote><\/figure>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p class=\"wp-block-paragraph\">One key, which is public and accessible by anyone, is used to encrypt data; another key, which is private and can only be used by the data&rsquo;s owner, is needed to decrypt it.<\/p>\n\n\n<p class=\"wp-block-paragraph\">The most common method of public key encryption is the RSA algorithm, which is based on the idea that it&rsquo;s very hard to factor large numbers. For example, it&rsquo;s easy to multiply 31 by 67 and get 2,077. But it&rsquo;s extremely difficult to take 2,077 and identify 31 x 67 as the equation that got you there.<\/p>\n\n\n<p class=\"wp-block-paragraph\">The longer the number, the harder it gets. Encryption today depends on factoring very big numbers, which would take a data center full of classical computers more than a million years. A sufficiently powerful quantum computer, on the other hand, will be able to find the combination of factors that make up the &ldquo;private key&rdquo; in about 100 seconds.<\/p>\n<\/blockquote>\n<\/blockquote><h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-large-fluid-font-size\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);font-style:normal;font-weight:600;line-height:1.3\">Who is behind the &ldquo;harvest now, decrypt later&rdquo; threat?<\/h3><p class=\"wp-block-paragraph\"><strong>Kevin Reifsteck:<\/strong> We&rsquo;re most concerned about nation-state threats. We&rsquo;re looking at who is making progress on quantum research and development, and who has the resources to steal large amounts of encrypted data and store it long enough for cryptographically relevant quantum computers (CQRCs) to be created. That&rsquo;s going to be a nation-state actor. It&rsquo;s much less likely that cybercriminals and non-state actors will have the capabilities and resources to harvest data at scale and also have access to a quantum computer in the near future.<\/p><h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-large-fluid-font-size\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);font-style:normal;font-weight:600;line-height:1.3\">What are these bad actors doing in the meantime?<\/h3><p class=\"wp-block-paragraph\"><strong>Kevin Reifsteck:<\/strong> The concern is that they are collecting encrypted data that will remain sensitive for at least a decade or longer. In the public sector, that means national security data, including intelligence and defense information. In the commercial world, healthcare data is a concern because it will be sensitive throughout a person&rsquo;s lifetime, and it can be valuable for intelligence, counterintelligence, and potentially blackmail.<\/p><h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-large-fluid-font-size\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);font-style:normal;font-weight:600;line-height:1.3\">So this is a bigger issue than stealing passwords&mdash;it&rsquo;s a government-level threat. How can a private company like Microsoft help?<\/h3><p class=\"wp-block-paragraph\"><strong>Kevin Reifsteck:<\/strong> We&rsquo;re trying to help governments push forward with the transition to quantum safety across the public sector as well as private industry, and a big part of that is providing quantum-safe technology. We made a <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/08\/20\/post-quantum-resilience-building-secure-foundations\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"company-wide commitment, aiming to enable early adoption of quantum safe capabilities across all ...\">company-wide commitment, aiming to enable early adoption of quantum safe capabilities across all our products and services by 2029 <\/a>and complete the transition by 2033. These timelines are in line with, or even slightly ahead of, most governments&rsquo; targets. That&rsquo;s important because Microsoft is going to provide the IT services and software that many companies across the global economy will use to meet government requirements.<\/p><h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-large-fluid-font-size\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);font-style:normal;font-weight:600;line-height:1.3\">The need for quantum-safe cryptography is a known risk. How can you prepare for the additional risks that might emerge when quantum computing at scale becomes a reality?<\/h3><p class=\"wp-block-paragraph\"><strong>Emily Violi Benjamin:<\/strong> We can take a lot of lessons from AI. The technology evolved quickly, but Microsoft was well positioned for it. As an example, our Office of Responsible AI was established in 2019, years before the emergence of GPT-3 in Microsoft products. We had governance and security frameworks in place to help us navigate an entirely new landscape. That&rsquo;s what we want to see with quantum. To do this, it is important to understand the domains where quantum computing will be most impactful, namely chemistry and material science R&amp;D, to anticipate and address risk now.<\/p><p class=\"wp-block-paragraph\">In these fields, there is the potential for &ldquo;dual use&rdquo; of technology&mdash;it can be used to benefit people, or it can be used for harm. That&rsquo;s true today with AI in computing for science, and it will be true in the future with quantum. We are working to help civil society, governments, and technology makers come together to discuss what responsible computing means in the quantum era so we can safely use these technologies for societally beneficial purposes.<\/p><h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-large-fluid-font-size\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);font-style:normal;font-weight:600;line-height:1.3\">Why are global standards so important?<\/h3><p class=\"wp-block-paragraph\"><strong>Kevin Reifsteck:<\/strong> For most organizations, the transition to quantum-safe cryptography will happen in the background&mdash;vendors and companies like Microsoft will update encryption with quantum-safe algorithms in the hardware and software they provide. These vendors serve global markets. If every country has different requirements, it&rsquo;s difficult to engineer products that work for customers worldwide.<\/p><p class=\"wp-block-paragraph\">The work happening within international organizations now aims to standardize quantum-safe algorithms and the way these algorithms should be implemented in our software and hardware. We participate in these efforts in multiple organizations, including the National Institute of Standards and Technology (NIST), the International Organization for Standardization (ISO), and the Internet Engineering Task Force (IETF). That makes it easier for everyone: IT companies can build to standards that have been created and tested through a rigorous international process rather than having to make decisions themselves, and the technology will be interoperable everywhere in the world. Organizations will be able to rely on their vendors to upgrade the vast majority of their encryption without necessarily having to understand the technical details of the algorithms.<\/p><p class=\"wp-block-paragraph\"><strong>Emily Violi Benjamin:<\/strong> We are in a pivotal moment for quantum computing development. Engineers and researchers are working on many different approaches for quantum computers. And the progress demonstrated across the industry over the past two years has been remarkable. While we are in the early stages of quantum computing standards development, one thing is very clear: global collaboration among trusted partners will accelerate our path to utility-scale quantum computing. Interoperability, standard terminology or criteria for benchmarking quantum achievements, and frameworks that continue to enable innovation and partnership should all be important focus areas. As we often say, &ldquo;A rising tide lifts all boats.&rdquo;<\/p><h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-large-fluid-font-size\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);font-style:normal;font-weight:600;line-height:1.3\">What are some common misconceptions about quantum safety?<\/h3><p class=\"wp-block-paragraph\"><strong>Kevin Reifsteck:<\/strong> One of the biggest misconceptions is that becoming quantum-safe is just about replacing one algorithm with another. People don&rsquo;t realize that quantum-safe encryption algorithms have different performance requirements than public key encryption algorithms do. That can create unique engineering challenges in some situations. For example, computers may need specificized hardware accelerators to run quantum-safe encryption algorithms at scale without slowing down operations. It&rsquo;s not as easy as switching out some lines of code.<\/p><p class=\"wp-block-paragraph\">Another misconception is that there is a long time before we really need to worry about quantum safety. If a quantum computer that can break current encryption may not exist until 2035, why do we need to change things now? The reality is that the transition to quantum safety is a complex, multi-step process that will take years. If organizations don&rsquo;t start now, they may not have enough time to get ready before the threat moves from theoretical to real.<\/p><h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-large-fluid-font-size\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);font-style:normal;font-weight:600;line-height:1.3\">How can organizations figure out where to begin?<\/h3><p class=\"wp-block-paragraph\"><strong>Kevin Reifsteck:<\/strong> It&rsquo;s actually not as daunting as people tend to think. The first step is doing a cryptographic inventory, which means mapping out where and how encryption is used across all your organization&rsquo;s systems and data. That map shows you where your quantum risks lie and what needs to be replaced by quantum-safe encryption. It&rsquo;s a critical first step, and it doesn&rsquo;t require you to understand technical details about the algorithms themselves.<\/p><p class=\"wp-block-paragraph\">We recommend focusing on the most pressing concern&mdash;harvest now, decrypt later&mdash;to make the cryptographic inventory more manageable. Organizations should focus on identifying the cryptography that&rsquo;s protecting data that will be sensitive for 10 years or more. That will help reduce the scope of the task but still allow important progress toward quantum safety.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kevin Reifsteck, Director for Cybersecurity Policy, and Emily Violi Benjamin, Senior Program Manager, Quantum Legal and Policy, discuss quantum safety, correct common misconceptions, and share practical tips for how organizations can prepare for the quantum future.<\/p>\n","protected":false},"author":23,"featured_media":2433,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_microsoft_sidebar_content":"<!-- wp:group {\"metadata\":{\"name\":\"Social Share\"},\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|sm\"}},\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"left\"},\"microsoftBreakpointId\":\"05xlfuiuy\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-05xlfuiuy\" data-microsoft-breakpoint-id=\"05xlfuiuy\"><!-- wp:paragraph {\"style\":{\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"600\",\"textTransform\":\"uppercase\",\"letterSpacing\":\"6px\"}},\"fontSize\":\"body-sm\"} -->\n<p class=\"has-body-sm-font-size\" style=\"font-style:normal;font-weight:600;letter-spacing:6px;text-transform:uppercase\">Share<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:microsoft-social-share\/social-share {\"show_facebook\":false,\"order_share\":2,\"order_facebook\":3,\"order_x\":1,\"order_linkedin\":0,\"backgroundColor\":\"#291817\",\"globalUrlOverride\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\",\"xUrlOverride\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"className\":\"temp-color-scheme-post-card temp-left-card\",\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|sm\",\"bottom\":\"var:preset|spacing|sm\",\"left\":\"var:preset|spacing|sm\",\"right\":\"var:preset|spacing|sm\"}}},\"layout\":{\"type\":\"default\"},\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]},\"hoverTextColor\":\"#c6e3f3\",\"hoverLinkColor\":\"#c6e3f3\",\"microsoftBreakpointId\":\"8vxt56kk0\"} -->\n<div class=\"wp-block-group temp-color-scheme-post-card temp-left-card has-hover-text has-hover-link microsoft-breakpoint-id-8vxt56kk0\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-text-color:#c6e3f3;--hover-link-color:#c6e3f3\" data-microsoft-breakpoint-id=\"8vxt56kk0\"><!-- wp:heading {\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h2 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.2\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/08\/20\/post-quantum-resilience-building-secure-foundations\/\" target=\"_blank\" rel=\"noreferrer noopener\">Post-quantum resilience: building secure foundations&nbsp;<\/a><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/08\/20\/post-quantum-resilience-building-secure-foundations\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read the article<img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" style=\"width: 1em;)\" class=\"ignite-wp-icon\"><\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"className\":\"temp-color-scheme-post-card temp-left-card\",\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|sm\",\"bottom\":\"var:preset|spacing|sm\",\"left\":\"var:preset|spacing|sm\",\"right\":\"var:preset|spacing|sm\"}}},\"layout\":{\"type\":\"default\"},\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]},\"hoverTextColor\":\"#c6e3f3\",\"hoverLinkColor\":\"#c6e3f3\",\"microsoftBreakpointId\":\"v944tw5gv\"} -->\n<div class=\"wp-block-group temp-color-scheme-post-card temp-left-card has-hover-text has-hover-link microsoft-breakpoint-id-v944tw5gv\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-text-color:#c6e3f3;--hover-link-color:#c6e3f3\" data-microsoft-breakpoint-id=\"v944tw5gv\"><!-- wp:heading {\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h2 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.2\"><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\">Microsoft Digital Defense Report 2025&nbsp;<\/a><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read the report <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" style=\"width: 1em;)\" class=\"ignite-wp-icon\"><\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:quote {\"className\":\"is-style-framed\",\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]}} -->\n<blockquote class=\"wp-block-quote is-style-framed\"><!-- wp:paragraph -->\n<p>We are working to help civil society, governments, \u2028and technology makers come together to discuss what responsible computing means in the quantum era&nbsp;so we can safely use these technologies for societally beneficial&nbsp;\u2028purposes.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"fontSize\":\"body\",\"fontFamily\":\"segoe-sans\"} -->\n<p class=\"has-segoe-sans-font-family has-body-font-size\">Emily Violi&nbsp;Benjamin,<br>Senior Program Manager,<br>Quantum Legal and Policy<\/p>\n<!-- \/wp:paragraph --><\/blockquote>\n<!-- \/wp:quote -->","_microsoft_bottom_content":"<!-- wp:group {\"align\":\"wide\",\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|xl-fluid\"}},\"layout\":{\"type\":\"grid\",\"minimumColumnWidth\":\"19rem\"},\"microsoftBreakpointId\":\"vg97ktoc2\"} -->\n<div class=\"wp-block-group alignwide microsoft-breakpoint-id-vg97ktoc2\" data-microsoft-breakpoint-id=\"vg97ktoc2\"><!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableNewTab\":true,\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"pfr69a49k\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-pfr69a49k\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-new-tab=\"true\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"pfr69a49k\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2467,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/11\/CELA_MTAC5Things_heroart-scaled.png\" alt=\"Cybersecurity story: 5 things you need to know about tracking today\u2019s nation-state threats\" class=\"wp-image-2467\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\">5 things you need to know about tracking today\u2019s nation-state threats<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"left\"}} -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\">\n    <span class=\"screen-reader-text\">\n      Read \u201c5 things threat analysts wish you knew\u201d\n    <\/span>\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableNewTab\":true,\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"zvte7hqkf\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-zvte7hqkf\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-new-tab=\"true\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"zvte7hqkf\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2468,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/11\/HEADER_DCU.webp\" alt=\"Cybersecurity story: The CyberPeace Institute is helping NGOs defend themselves\u2014before it\u2019s too late\" class=\"wp-image-2468\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\">The CyberPeace Institute is helping NGOs defend themselves\u2014before it\u2019s too late<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"left\"}} -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\">\n    \n    <span class=\"screen-reader-text\">\n      Read \u201cProtecting NGOs from cyberattacks\u201d\n    <\/span>\n\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableNewTab\":true,\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"z56ueg848\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-z56ueg848\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-new-tab=\"true\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"z56ueg848\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2469,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"large\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/blog\/2023\/11\/01\/starting-your-journey-to-become-quantum-safe\/\" target=\"_blank\" rel=\" noreferrer noopener\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/11\/CLO22_SecOps_006-1-1024x683.jpg\" alt=\"Security blog post: Starting your journey to becoming quantum-safe\" class=\"wp-image-2469\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/blog\/2023\/11\/01\/starting-your-journey-to-become-quantum-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Starting your journey to becoming quantum-safe<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/blog\/2023\/11\/01\/starting-your-journey-to-become-quantum-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">\n\n    <span class=\"screen-reader-text\">\n      Read \u201cStarting your journey to become quantum-safe\u201d\n    <\/span>\n\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group --><\/div>\n<!-- \/wp:group -->","_microsoft_story_hero_content":"<!-- wp:group {\"align\":\"wide\",\"style\":{\"spacing\":{\"blockGap\":\"0\"},\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"600\",\"textTransform\":\"uppercase\",\"letterSpacing\":\"0.15em\",\"lineHeight\":\"1\"}},\"fontSize\":\"body-xs\",\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"left\"},\"microsoftBreakpointId\":\"zmxsh4o4w\"} -->\n<div class=\"wp-block-group alignwide has-body-xs-font-size microsoft-breakpoint-id-zmxsh4o4w\" style=\"font-style:normal;font-weight:600;letter-spacing:0.15em;line-height:1;text-transform:uppercase\" data-microsoft-breakpoint-id=\"zmxsh4o4w\"><!-- wp:tenup\/post-primary-term {\"isLink\":false,\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|xs\",\"bottom\":\"var:preset|spacing|xs\",\"left\":\"var:preset|spacing|xs\",\"right\":\"var:preset|spacing|xs\"}},\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|clear-blue\"}}}},\"backgroundColor\":\"brown-black\",\"textColor\":\"clear-blue\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"align\":\"wide\",\"className\":\"is-style-post-header\",\"layout\":{\"type\":\"flex\",\"flexWrap\":\"wrap\",\"justifyContent\":\"space-between\",\"verticalAlignment\":\"bottom\"},\"microsoftBreakpointId\":\"3xxgrttak\"} -->\n<div class=\"wp-block-group alignwide is-style-post-header microsoft-breakpoint-id-3xxgrttak\" data-microsoft-breakpoint-id=\"3xxgrttak\"><!-- wp:group {\"style\":{\"layout\":{\"selfStretch\":\"fixed\",\"flexSize\":\"\"}},\"layout\":{\"type\":\"default\"},\"microsoftBreakpointId\":\"kgbedb7qx\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-kgbedb7qx\" data-microsoft-breakpoint-id=\"kgbedb7qx\"><!-- wp:post-title {\"level\":1,\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-4-xl-fluid\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:post-excerpt {\"style\":{\"layout\":{\"selfStretch\":\"fit\",\"flexSize\":\"\"}}} \/--><\/div>\n<!-- \/wp:group -->","_microsoft_story_content_prefix_content":"<!-- wp:group {\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"right\",\"orientation\":\"horizontal\",\"verticalAlignment\":\"bottom\"},\"microsoftBreakpointId\":\"78xaub60h\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-78xaub60h\" data-microsoft-breakpoint-id=\"78xaub60h\"><!-- wp:post-date {\"format\":\"M j, Y\"} \/--><\/div>\n<!-- \/wp:group -->","_microsoft_story_content_suffix_content":"<!-- wp:paragraph {\"placeholder\":\"Add content to this area...\"} -->\n<p><\/p>\n<!-- \/wp:paragraph -->","_microsoft_author-bio_content":"","_microsoft_responsive_featured_images":[],"_microsoft_use_source_image":false,"_microsoft_color_scheme":"clear-blue","footnotes":""},"categories":[13],"tags":[],"topic":[48],"class_list":["post-2432","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preparing for the quantum unknown | Microsoft<\/title>\n<meta name=\"description\" content=\"Microsoft policy leaders discuss quantum safety, correct common misconceptions, and share tips for how organizations can prepare for the quantum future.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preparing for the quantum unknown | Microsoft\" \/>\n<meta property=\"og:description\" content=\"Microsoft policy leaders discuss quantum safety, correct common misconceptions, and share tips for how organizations can prepare for the quantum future.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Corporate Responsibility\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-08T15:11:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-28T23:10:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1-1024x427.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CELA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CELA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\"},\"author\":{\"name\":\"CELA\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0\"},\"headline\":\"Preparing for the quantum unknown\",\"datePublished\":\"2025-12-08T15:11:51+00:00\",\"dateModified\":\"2026-01-28T23:10:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\"},\"wordCount\":1647,\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\",\"name\":\"Preparing for the quantum unknown | Microsoft\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png\",\"datePublished\":\"2025-12-08T15:11:51+00:00\",\"dateModified\":\"2026-01-28T23:10:50+00:00\",\"description\":\"Microsoft policy leaders discuss quantum safety, correct common misconceptions, and share tips for how organizations can prepare for the quantum future.\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#primaryimage\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png\",\"contentUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png\",\"width\":1920,\"height\":800,\"caption\":\"Kevin Reifsteck, Director for Cybersecurity Policy, and Emily Violi Benjamin, Senior Program Manager, Quantum Legal and Policy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preparing for the quantum unknown\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"name\":\"Corporate Responsibility\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\",\"name\":\"Corporate Responsibility\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Corporate Responsibility\"},\"image\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0\",\"name\":\"CELA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"caption\":\"CELA\"},\"sameAs\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/cybersecurity\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preparing for the quantum unknown | Microsoft","description":"Microsoft policy leaders discuss quantum safety, correct common misconceptions, and share tips for how organizations can prepare for the quantum future.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/","og_locale":"en_US","og_type":"article","og_title":"Preparing for the quantum unknown | Microsoft","og_description":"Microsoft policy leaders discuss quantum safety, correct common misconceptions, and share tips for how organizations can prepare for the quantum future.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/","og_site_name":"Microsoft Corporate Responsibility","article_published_time":"2025-12-08T15:11:51+00:00","article_modified_time":"2026-01-28T23:10:50+00:00","og_image":[{"width":1024,"height":427,"url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1-1024x427.png","type":"image\/png"}],"author":"CELA","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CELA","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#article","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/"},"author":{"name":"CELA","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0"},"headline":"Preparing for the quantum unknown","datePublished":"2025-12-08T15:11:51+00:00","dateModified":"2026-01-28T23:10:50+00:00","mainEntityOfPage":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/"},"wordCount":1647,"publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/","name":"Preparing for the quantum unknown | Microsoft","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png","datePublished":"2025-12-08T15:11:51+00:00","dateModified":"2026-01-28T23:10:50+00:00","description":"Microsoft policy leaders discuss quantum safety, correct common misconceptions, and share tips for how organizations can prepare for the quantum future.","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#primaryimage","url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png","contentUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png","width":1920,"height":800,"caption":"Kevin Reifsteck, Director for Cybersecurity Policy, and Emily Violi Benjamin, Senior Program Manager, Quantum Legal and Policy"},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/celacampaig.wpenginepowered.com\/"},{"@type":"ListItem","position":2,"name":"Preparing for the quantum unknown"}]},{"@type":"WebSite","@id":"https:\/\/celacampaig.wpenginepowered.com\/#website","url":"https:\/\/celacampaig.wpenginepowered.com\/","name":"Corporate Responsibility","description":"","publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization","name":"Corporate Responsibility","url":"https:\/\/celacampaig.wpenginepowered.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Corporate Responsibility"},"image":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0","name":"CELA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","caption":"CELA"},"sameAs":["https:\/\/cm-edgetun.pages.dev\/en-us\/corporate-responsibility\/cybersecurity\/"]}]}},"_links":{"self":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts\/2432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/comments?post=2432"}],"version-history":[{"count":0,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts\/2432\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media\/2433"}],"wp:attachment":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media?parent=2432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/categories?post=2432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/tags?post=2432"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/topic?post=2432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}