Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Senators Introduce Bipartisan Quantum Computing Cybersecurity Bill

A bipartisan bill that seeks to strengthen national security against quantum-computing threats has been introduced in the US Senate.

Co-sponsored by Senators Rob Portman (R-OH) and Maggie Hassan (D-NH), the bill was introduced in the House in April and passed in July.

A bipartisan bill that seeks to strengthen national security against quantum-computing threats has been introduced in the US Senate.

Co-sponsored by Senators Rob Portman (R-OH) and Maggie Hassan (D-NH), the bill was introduced in the House in April and passed in July.

The Quantum Computing Cybersecurity Preparedness Act addresses federal agencies’ preparedness for quantum computing and requires them to adopt proper defenses against quantum-computing-enabled data breaches.

The bill underlines the need to migrate federal agencies’ information technology systems to post-quantum cryptography and mandates that the Office of Management and Budget (OMB) will supervise the migration process.

“The rapid progress of quantum computing suggests the potential for adversaries of the United States to steal sensitive encrypted data today using classical computers, and wait until sufficiently powerful quantum systems are available to decrypt it,” the bill reads.

Per the bill, OMB will also guide federal agencies for one year after the National Institute of Standards and Technology (NIST) issues post-quantum cryptography standards, and will keep Congress informed on the status of federal agencies’ migration to post-quantum cryptography standards and on post-quantum cryptography risks, defenses and necessary funding.

If passed by the Senate, the bill, which is also supported by tech companies such as Google, IBM, and Quantinuum, would then go to the president, to be signed into law.

“Quantum computing will provide for huge advances in computing power, but it will also create new cybersecurity challenges. This bipartisan legislation will require the government to inventory its cryptographic systems, determine which are most at risk from quantum computing, and upgrade those systems accordingly. I urge my colleagues to join us in supporting this legislation,” Portman said.

Advertisement. Scroll to continue reading.

Related: House Passes ICS Cybersecurity Training Bill

Related: Lawmakers Introduce Combined Bill for Strengthening Critical Infrastructure Security

Related: Cyber Incident Disclosure Bill Passes in Senate Amid Fears of Russian Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem