{"id":1839,"date":"2025-04-07T08:43:54","date_gmt":"2025-04-07T12:43:54","guid":{"rendered":"https:\/\/www.vernchilders.com\/?p=1839"},"modified":"2025-04-07T08:43:54","modified_gmt":"2025-04-07T12:43:54","slug":"quantum-technology-cyber-security","status":"publish","type":"post","link":"https:\/\/www.vernchilders.com\/index.php\/2025\/04\/07\/quantum-technology-cyber-security\/","title":{"rendered":"Quantum Technology &amp; Cyber Security"},"content":{"rendered":"\n<p>Encouraging news for the future of <strong>#CyberSecurity<\/strong>! The proposed transition to <strong>#QuantumSafeEncryption<\/strong> is crucial for business leaders in every industry as quantum computing advances. By adopting these proactive strategies, we can ensure our data remains secure and resilient to future threats, protecting our organizations and customers alike. <strong>#DataProtection<\/strong> <strong>#RiskManagement<\/strong> <strong>#QuantumComputing<\/strong> <strong>#TechTrends<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.computerweekly.com\/news\/366621031\/NCSC-proposes-three-step-plan-to-move-to-quantum-safe-encryption\">https:\/\/www.computerweekly.com\/news\/366621031\/NCSC-proposes-three-step-plan-to-move-to-quantum-safe-encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encouraging news for the future of #CyberSecurity! The proposed transition to #QuantumSafeEncryption is crucial for business leaders in every industry as quantum computing advances. By adopting these proactive strategies, we can ensure our data remains secure and resilient to future threats, protecting our organizations and customers alike. #DataProtection #RiskManagement #QuantumComputing #TechTrends https:\/\/www.computerweekly.com\/news\/366621031\/NCSC-proposes-three-step-plan-to-move-to-quantum-safe-encryption<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1839","post","type-post","status-publish","format-standard","hentry","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts\/1839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/comments?post=1839"}],"version-history":[{"count":1,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts\/1839\/revisions"}],"predecessor-version":[{"id":1840,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts\/1839\/revisions\/1840"}],"wp:attachment":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/media?parent=1839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/categories?post=1839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/tags?post=1839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}