{"id":14969,"date":"2025-10-16T11:24:00","date_gmt":"2025-10-16T11:24:00","guid":{"rendered":"https:\/\/newestek.com\/?p=14969"},"modified":"2025-10-16T11:24:00","modified_gmt":"2025-10-16T11:24:00","slug":"theres-no-such-thing-as-quantum-incident-response-and-that-changes-everything","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14969","title":{"rendered":"There\u2019s no such thing as quantum incident response \u2013 and that changes everything"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>One of the key elements to detecting cyberattacks is the concept of observability. We can literally see the packets of data being thrown towards a website when a DoS attack is taking place. The \u201cboom\u201d of the attack is visible and observable. But when a cryptographically relevant quantum computer is utilized to break into encrypted traffic flows, the attacker \u201csnoops\u201d the traffic and stores a copy somewhere else where it can be processed later with impunity, which makes the act both not observed and not observable.<\/p>\n<p>This is what I call the \u201csilent boom,\u201d and it will most definitely be a plate tectonic shift in the world of secrets and privacy, disrupting the balance of power for every nation, every industry and every individual.<\/p>\n<p>The evidence isn\u2019t theoretical. According to network security firm Qrator Labs, <a href=\"https:\/\/qrator.net\/blog\/details\/q2-2024-ddos-bots-and-bgp-incidents-statistics-and\" target=\"_blank\" rel=\"noreferrer noopener\">there were approximately 13,626 BGP hijack attacks<\/a> in the second quarter of 2024 and 13,438 in the third quarter. Not all are malicious, but enough create that \u201cscenic route\u201d through Chinese-owned or Russian-owned IP addresses that makes security professionals nervous about store-now-decrypt-later attacks.<\/p>\n<p>At Marvel, we had secrets that, if disclosed ahead of the planned time, would cause significant damage to the brand and potentially also to projected revenues. The actors who attend the red carpet premiere have no idea what they\u2019re going to see on screen. The scripts they were given had false scenes in them as a means of forensic watermarking that helps identify leaks. When you\u2019re protecting 10-year story arcs and plans for what comes after phase 6 of the Multiverse Saga, you develop an appreciation for what needs long-term protection.<\/p>\n<h2 class=\"wp-block-heading\" id=\"this-is-a-developer-problem-not-a-ciso-shopping-problem\">This is a developer problem, not a CISO shopping problem<\/h2>\n<p>CISOs are directing attention to have quantum security risks added to the corporate risk register. It belongs there. But the problem to be solved is not a quick fix, despite what some snake oil salesmen might be pushing. There is no simple configuration checkbox on AWS or Azure or GCP where you \u201cturn on\u201d post-quantum cryptography (PQC) and then you\u2019re good to go. This is a shared responsibility problem. Just as migrating to the cloud doesn\u2019t magically make your infrastructure more secure, quantum vendors cannot solve this without significant developer engagement.<\/p>\n<p>Here\u2019s why this lands on developers: The majority of all internet traffic is not human-generated traffic from laptops to servers and back. It\u2019s API traffic. Your company most likely delivers services using a host of third-party solutions, all accessed via APIs. So your API client needs to learn how to speak PQC algorithms just as much as that remote API endpoint needs to learn how to speak PQC algorithms. Otherwise, the connection will negotiate down to a common protocol that both can speak and it won\u2019t be TLSv1.3 with PQC algorithms.<\/p>\n<p>Without significant engagement from developers, QA teams and product owners, the quantum decryption risk will remain in play. You cannot transfer this risk by adding more cyber insurance policy coverage. The entire cyber insurance industry itself is in a bit of an existential doubt situation regarding whether cybersecurity can reasonably be insured against, given the systemic impacts of supply chain attacks that cascade across entire industries.<\/p>\n<p>What can developers actually do? Three concrete steps this quarter:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Step one<\/strong>: Inventory your algorithms and data with a view towards which sensitive data ought to be protected with PQC. This is a data classification exercise where you need to add a column to track whether the datastore or application qualifies for PQC.<\/li>\n<li><strong>Step two<\/strong>: Check your internet-facing assets to see which, if any, are already capable of supporting TLSv1.3 with PQC algorithms.<\/li>\n<li><strong>Step three<\/strong>: Create internal capability to test new ciphers so that once NIST is able to \u201cbless\u201d another set of candidates (two of the first set of four algorithms have already been broken), you\u2019ll be positioned to implement them without a five- to 10-year lag time.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"the-fearmongering-critics-are-missing-the-point\">The fearmongering critics are missing the point<\/h2>\n<p>Critics say this is fearmongering and that we\u2019ll have warning signs before quantum becomes a real threat. They\u2019re wrong on the timeline. In my discussions with colleagues on the quantum security working group for the World Economic Forum, we see that financial services, healthcare and manufacturing are making plans now because they understand something crucial: It took us at least 10 years to get financial services to move to SHA-256 for encryption and for PCI compliance requirements to deprecate SSLv3 after TLS came into play in 1999. The insecure protocols weren\u2019t formally deprecated until PCI DSS version 3.1 in 2015. That\u2019s the current speed of \u201ccrypto agility\u201d in financial services.<\/p>\n<p>The cryptographically relevant quantum computer risk, being about five to 10 years away, is essentially a now risk, given the rate of adoption of new cryptography standards. The most dangerous myth seems to be that it can be put off to tomorrow and that nothing needs to be done today.<\/p>\n<p>We\u2019ve seen recent kerfuffles over <a href=\"https:\/\/www.linkedin.com\/pulse\/chinese-did-crack-rsa-quantum-yet-marin-ivezic-kew0c\/\" target=\"_blank\" rel=\"noreferrer noopener\">factoring 22-bit RSA keys in research papers published in China<\/a>, which is just a trivial academic milestone that doesn\u2019t purport the demise of RSA-2048 encryption. But we will continue to see advancements in hybrid classical-quantum approaches to factoring integers. The writing is on the wall.<\/p>\n<p>Meanwhile, I\u2019ve seen some pretty insane LinkedIn assertions from organizations making statements about computers with 4,000 qubits. For RSA-2048 to be broken, according to Shor\u2019s algorithm, we would need around 20 million qubit quantum computers. So we are still orders of magnitude away. (The marketing teams will make sweeping generalizations about achievements and write them off as \u201cgood enough,\u201d often comparing physical qubits and logical qubits as if they\u2019re the same thing, but that is a classic apples-and-oranges fallacy.)<\/p>\n<h2 class=\"wp-block-heading\" id=\"monday-morning-action-items\">Monday morning action items<\/h2>\n<p>The moment when a cryptographically relevant quantum computer comes into existence won\u2019t arrive with fanfare or bombast. Hence, the idea of the silent boom. But by then, it will be too late for incident response.<\/p>\n<p>What you should do Monday morning: Start that data classification exercise. Figure out what needs protecting for the long term versus what has a shorter shelf life. In the world of DNS, we have Time To Live (TTL) that declares how long a resolver can cache a response. Think of a \u201cPQC TTL\u201d for your sensitive data, because not everything needs 30-year protection.<\/p>\n<p>Just as the HTTPS-everywhere movement took time to gain traction, so too will the PQC-everywhere efforts. The difference is we can\u2019t wait for the attack to happen before we start preparing. There\u2019s no such thing as quantum incident response \u2014 only quantum readiness.<\/p>\n<\/p>\n<p><strong>This article is published as part of the Foundry Expert Contributor Network.<br \/><\/strong><a href=\"https:\/\/www.csoonline.com\/expert-contributor-network\/\"><strong>Want to join?<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>One of the key elements to detecting cyberattacks is the concept of observability. We can literally see the packets of data being thrown towards a website when a DoS attack is taking place. The \u201cboom\u201d of the attack is visible and observable. But when a cryptographically relevant quantum computer is utilized to break into encrypted traffic flows, the attacker \u201csnoops\u201d the traffic and stores a&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14969\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14969","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14969"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14969\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}