BACK TO NEWS

Protegrity Shares Perspective on Quantum Readiness and Post-Quantum Cryptography

By Protegrity
May 19, 2026

Summary

5 min
  • InfoWorld explores what enterprises can do with quantum computing today:
    The article explains that while quantum computing is still early for everyday enterprise workloads, organizations can begin building skills, testing cloud-based quantum services, researching use cases, and preparing for future security impacts.

  • Protegrity POV: post-quantum cryptography should be a near-term priority:
    Arjun Kudinoor emphasizes that enterprises should focus now on upgrading public-key infrastructure to post-quantum cryptography, especially because sensitive data encrypted today may become vulnerable as quantum capabilities mature.

Quantum computing may still be early for everyday enterprise use, but the security planning window is already open. In a recent InfoWorld article, industry experts explain how organizations can begin building quantum readiness today—from experimenting with cloud-based quantum services to identifying where future security risks may emerge. Protegrity’s Arjun Kudinoor adds that the most urgent step is not adopting quantum hardware, but preparing public-key infrastructure for a post-quantum world before today’s encrypted data becomes tomorrow’s exposure risk.

Why quantum readiness starts before quantum scale

InfoWorld explains that today’s quantum systems remain limited and error-prone, making most enterprise use cases experimental. Organizations can still access quantum systems through cloud-based services, explore hybrid quantum-classical approaches, and evaluate potential applications in areas such as optimization, simulation, machine learning, logistics, life sciences, and advanced research.

However, the article makes clear that the security implications of quantum computing require earlier action. Even if large-scale quantum attacks are not yet practical, organizations need to understand which systems, secrets, and data may remain sensitive long enough to be exposed in the future.

Protegrity perspective on post-quantum security

Arjun Kudinoor notes that enterprises should focus now on upgrading public-key infrastructure to post-quantum cryptography. While quantum attacks capable of breaking large-key encryption such as RSA-2048 are not yet feasible, data encrypted today may become vulnerable later as quantum capabilities mature.

This is especially important for long-lived sensitive data, including customer information, intellectual property, authentication keys, and other records that may retain value for years. The article also highlights the risk that attackers may collect encrypted data now with the expectation that they can decrypt it later when quantum computing becomes more capable.

Why enterprises should prepare for Q-Day

The article frames Q-Day as the point when quantum computers become capable of breaking widely used cryptographic algorithms. Preparing for that future will require more than watching the market mature. Organizations need to inventory cryptographic dependencies, identify sensitive data with long-term value, and begin planning the migration to quantum-resistant standards.

For enterprise security teams, that means quantum readiness should be treated as a practical data protection and infrastructure planning issue, not only as a future research topic.

What this means for enterprise leaders

The takeaway is that quantum computing may still be in an early stage for business applications, but the security planning window is already open. Enterprises can begin learning, experimenting, and identifying future use cases while also preparing their cryptographic environments for a post-quantum world.

For organizations handling sensitive or long-lived data, post-quantum cryptography planning is a critical step toward maintaining data protection as computing capabilities evolve.

Note: This summary is based on the external InfoWorld article “What can you do with quantum computing today?” and is provided for convenience. Please refer to the original publication for full context and source reporting.