
SEALSQ CEO Carlos Moreira tells executives at Cantor's Quantum Security Event in New York that organizations must deploy post-quantum cryptography (PQC) now to protect high-value systems before quantum computers break current encryption. NIST finalized the first PQC standards in August 2024 and is urging immediate transition. Moreira argues the strategy isn't predicting 'Q-Day' perfectly, but removing quantum-vulnerable cryptography before it matters.
Why it matters
Quantum computers will eventually break today's public-key encryption, exposing sensitive data and critical infrastructure across enterprises. Organizations that wait risk catastrophic security breaches when quantum capability arrives, while early adopters can methodically transition systems using NIST-approved standards already available. The window to act proactively is closing as quantum computing advances accelerate.
What to do
Inventory your systems using public-key cryptography and prioritize migrating high-value assets to NIST's PQC standards immediately. Consider layering Secure Key Agreement protocols as complementary protection during the transition period.