{"id":100699,"date":"2025-08-27T22:36:10","date_gmt":"2025-08-27T22:36:10","guid":{"rendered":"https:\/\/www.newsbeep.com\/au\/100699\/"},"modified":"2025-08-27T22:36:10","modified_gmt":"2025-08-27T22:36:10","slug":"the-dual-threat-of-ai-and-quantum-computing-it-leaders-brace-for-the-next-data-security-era","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/au\/100699\/","title":{"rendered":"The dual threat of AI and quantum computing: IT leaders brace for the next data security era"},"content":{"rendered":"<p>Artificial intelligence (AI) adoption is accelerating, and quantum computing is steadily moving from theory to reality. In fact, <a href=\"https:\/\/www.cio.com\/article\/3621185\/2025-is-the-year-of-quantum-science-what-thats-all-about.html\" target=\"_blank\" rel=\"nofollow noopener\">the United Nations declared<\/a> 2025 the International Year of Quantum Science and Technology, signaling quantum\u2019s shift from experimental research to real-world applications.<\/p>\n<p>For IT leaders, the convergence of AI and quantum represents both unprecedented opportunity and an emerging security crisis. From deepfake-enabled phishing campaigns that are eroding trust to the looming quantum decryption threat that could expose decades of secured data, IT leaders face a race to rethink their defenses.<\/p>\n<p>Foundry reached out to the CIO Experts Network, a community of IT professionals and technology industry influencers, to explore the most vexing data security challenge for IT leaders over the next few years \u2014 and solutions for countering these threats. Their responses point to a dual challenge: countering today\u2019s AI-enabled threats while preparing for the disruptive impact of quantum computing.<\/p>\n<p>The quantum clock is ticking<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/imdbest333\/\" target=\"_blank\" rel=\"sponsored nofollow noopener\">Vivek Singh,<\/a> senior vice president of IT and Strategic Planning at PALNAR, warns that quantum computing could render encryption useless across email, WhatsApp, virtual private networks (VPNs), authentication protocols, digital signatures, and more.<\/p>\n<p>\u201cA critical challenge lies in the potential for retroactive decryption. If someone\u2019s sensitive data is stolen today, it could be decrypted in the future with quantum capabilities,\u201d he says. \u201cFrom my perspective, the most vexing challenge is managing the dual pressure of preparing for postquantum cryptographic resilience while simultaneously defending against increasingly sophisticated AI-enabled cyberthreats \u2014 we can say AI-driven threats like deepfakes, automated phishing, voice calibration, and intelligent malware. \u201c<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/delibero\/\" rel=\"sponsored nofollow noopener\" target=\"_blank\">Gene De Lib<\/a><a href=\"https:\/\/www.linkedin.com\/in\/delibero\/\" target=\"_blank\" rel=\"sponsored nofollow noopener\">e<\/a><a href=\"https:\/\/www.linkedin.com\/in\/delibero\/\" rel=\"sponsored nofollow noopener\" target=\"_blank\">ro<\/a>, principal consultant at Digital Mindshare LLC, agrees that the quantum deadline is near.<\/p>\n<p>\u201cAI-powered attacks are learning and adapting faster than security teams can respond,\u201d he says. \u201cWe\u2019re seeing malware that breaks out in 51 seconds and 560,000 new variants created daily. Meanwhile, bad actors are stealing encrypted data right now, banking on quantum computers\u2019 cracking it later. The real problem: You need to start quantum-safe crypto migration by 2026 while fighting AI threats that evolve faster than you can patch.\u201d<\/p>\n<p>AI: Faster, smarter, harder to detect<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/peternichol\/\" target=\"_blank\" rel=\"sponsored nofollow noopener\">Peter Nichol<\/a>, data and analytics leader for North America at Nestl\u00e9 Health Science, notes that AI-powered adversaries are already changing the game and that the rise of AI agents is expanding the attack landscape.<\/p>\n<p>\u201cToday\u2019s organizations face an increasingly complex and exposed digital surface area. Adversaries are also harnessing AI, automation, and crime-as-a-service ecosystems. Threats are no longer one-dimensional \u2014 they\u2019re multivector, AI-driven, and quantum-enabled. Dynamic data security risks are accelerating as we move toward quantum-enhanced AI [QAI],\u201d he says. \u201cThe speed and sophistication of these threats now exceed conventional defense thresholds. Quantum annealers, using variational algorithms, can rapidly train reinforcement learning agents, allowing autonomous malware to morph in hours rather than weeks and learn how to bypass detection on first execution.\u201d<\/p>\n<p>Nichol also points to the rise of AI-powered algorithmic collusion \u2014 malicious behaviors that emerge without explicit coordination and are nearly impossible to detect. These self-taught, cooperative threat patterns evolve independently, adapting in ways traditional defenses can\u2019t anticipate.<\/p>\n<p>\u201cA clear example is AI-driven botnets using reinforcement learning to evade detection. Multiple agents are deployed into a cloud-based microservice environment, where they independently learn which behaviors help them persist, spread, and avoid detection, such as altering email spelling, adjusting image-to-text ratios, or adapting to traffic throttling,\u201d says Nichol.<\/p>\n<p>The lack of coordination, combined with subtle behavioral drift, renders traditional detection methods ineffective. Nichol warns that AI agent collusion is creating decentralized, self-evolving threats that outpace conventional security models and demand entirely new defensive strategies.<\/p>\n<p>Defending today while preparing for tomorrow<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/mettelfox\/\" target=\"_blank\" rel=\"sponsored nofollow noopener\">Ed Fox,<\/a> CTO of MetTel, frames the issue as \u201ca two-front war: securing an ever-expanding, real-time digital frontier while racing to future-proof its very foundations.<\/p>\n<p>\u201cThe most vexing data security challenge for IT leaders is securing the explosion of decentralized, multimodal data generated by autonomous AI agents, especially as our industrial systems increasingly connect to the internet, creating new physical vulnerabilities. IT leaders must simultaneously defend against dynamic AI-driven threats that can impact physical operations now, while strategically preparing for a massive cryptographic overhaul to protect from future quantum attacks.\u201d<\/p>\n<p>Some see the path forward as requiring business alignment and cultural change alongside technical defenses. Arsalan Khan <a href=\"https:\/\/x.com\/ArsalanAKhan\" target=\"_blank\" rel=\"sponsored nofollow\">(@ArsalanAKhan<\/a>), a speaker, adviser, and blogger, argues that the biggest risk isn\u2019t just technical \u2014 it\u2019s strategic.<\/p>\n<p>\u201cWhile IT leaders can address the technical aspects \u2014 from data governance frameworks and postquantum cryptography readiness to AI threat detection \u2014 it\u2019s business leadership that must drive a culture of shared responsibility. In my view, the most vexing data security challenge for IT leaders today is not the technology itself but convincing business leadership that data security is no longer just an IT issue; it\u2019s an enterprise\u00a0imperative.\u201d\u00a0<\/p>\n<p>AI and quantum are converging to create a perfect storm for IT security. The challenge is not just to defend against sophisticated AI-enabled attacks now but also to act decisively before quantum computing renders today\u2019s safeguards obsolete.<\/p>\n<p><a href=\"https:\/\/www.opentext.com\/products\/data-security\" target=\"_blank\" rel=\"sponsored nofollow noopener\">Learn how OpenText can help secure your organization against the dual threats of AI and quantum cryptography.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Artificial intelligence (AI) adoption is accelerating, and quantum computing is steadily moving from theory to reality. In fact,&hellip;\n","protected":false},"author":2,"featured_media":100700,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[64,63,257,105],"class_list":{"0":"post-100699","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-au","9":"tag-australia","10":"tag-computing","11":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/100699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/comments?post=100699"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/100699\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media\/100700"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media?parent=100699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/categories?post=100699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/tags?post=100699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}