A single day with 4 breakthrough quantum tech developments - each with the potential to accelerate the arrival of Q-Day.

That’s exactly what happened on Sept 24–25.
I break it all down in the first issue of The Quantum Observer: https://quantumobserver.com/p/quantums-wild-week

#QuantumComputing #PQC #QDay #PostQuantum #QuantumReadiness #QuantumResilience

Quantum’s Wild Week

The week quantum research smashed timelines and regulators and industry organizations yelled “Move faster!”

The Quantum Observer
🚨 Did You Know 58% of Companies Aren't Prepared for Quantum Threats by 2025? 🔥
⚠️ 1 attack every 11 secs by 2025
🔐 Upgrade algorithms 🛡️ Quantum crypto 🤝 Innovate
Follow for daily 0-day alerts! 🚀
#CyberSecurity #QuantumResilience #Hacking https://t.co/kGyypgdWrc
Boards: quantum risk isn’t just a tech problem – it’s a governance issue. Regulators increasingly hold boards accountable for cyber risks, and that extends to quantum threats. A future quantum breach could lead to major liability. Smart executives are asking their CISOs today: “Are we preparing for the quantum threat?” #QuantumResilience https://postquantum.com/post-quantum/quantum-threat-executives-board/
What is the Quantum Threat? A Guide for C‑Suite Executives and Boards

Boards do not need to dive into the scientific intricacies of qubits and algorithms, but they do need to recognize that this is a strategically important risk – one that can’t be simply delegated away. It requires the same level of governance attention as other enterprise-level risks like financial compliance, geopolitical factors, or pandemic preparedness. The comforting news is that if organizations act early, the quantum threat can be managed. Think of the proactive stance many companies took with Y2K in the late 1990s – those who started early averted disaster. Similarly here, those who begin preparing for quantum now

PostQuantum - Quantum Computing, Quantum Security, PQC
Regulators now often require a cryptographic inventory as the first step to #QuantumResilience. But doing it manually (spreadsheets, interviews) usually fails – too incomplete and slow for large enterprises. The article discusses layering multiple discovery methods: static analysis of code, dynamic runtime monitoring, network packet inspection for old ciphers, scanning configs, parsing certificates, etc. It’s basically a detective mission using tools and teamwork #PQC https://postquantum.com/post-quantum/quantum-cryptographic-inventory
How to Perform a Comprehensive Quantum Readiness Cryptographic Inventory

A cryptographic inventory is essentially a complete map of all cryptography used in an organization’s systems – and it is vital for understanding quantum-vulnerable assets and planning remediation. In theory it sounds straightforward: “list all your cryptography.” In practice, however, building a full cryptographic inventory is an extremely complex, lengthy endeavor. Many enterprises find that even identifying all their IT assets is challenging, let alone uncovering every cryptographic component hidden within those assets. Cryptography often lurks in multiple layers of hardware, software, and firmware, making it difficult to spot. Despite the difficulty, performing a thorough inventory is strongly recommended (or

PostQuantum - Quantum Computing, Quantum Security, PQC
The first generation of quantum code-breakers won’t be cheap to run: each RSA-2048 crack could consume tens of MWh of energy. That means only high-value targets (think state secrets, huge financial transactions) would be worth the effort initially. But as tech improves (and if cheap fusion power arrives), that equation changes – mass decryption could become feasible. The window to upgrade our crypto is NOW, before energy ceases to be a barrier. #QuantumResilience https://postquantum.com/post-quantum/energy-cost-rsa-2048-quantum/
The Enormous Energy Cost of Breaking RSA‑2048 with Quantum Computers

The energy requirements for breaking RSA-2048 with a quantum computer underscore how different the post-quantum threat is from conventional hacking. It’s not just about qubits and math; it’s about megawatts, cooling systems, and power grids. Today, that reality means only the most potent actors would even contemplate such attacks, and even then only for the crown jewels of intelligence. Tomorrow, advances in both quantum engineering and energy production could erode even that barrier. The enormous costs – in dollars and joules – of quantum cryptanalysis serve as a stark warning and a call to action. They buy us time to

PostQuantum - Quantum Computing, Quantum Security, PQC
The good news: Q-Day isn’t the end of the world if we’ve prepared. In the aftermath, we’ll see an accelerated rollout of post-quantum encryption, emergency patches to protocols, and likely new regulations enforcing crypto standards. The article stresses that we should be acting now to avoid panic later. #QuantumResilience https://postquantum.com/post-quantum/q-day-y2q-what-will-happen/
What Will Really Happen Once Q-Day Arrives – When Our Current Cryptography Is Broken?

As the world edges closer to the era of powerful quantum computers, experts warn of an approaching “Q-Day” (sometimes called Y2Q or the Quantum Apocalypse): the day a cryptographically relevant quantum computer can break our current encryption. Unlike the Y2K bug—which had a fixed deadline and was mostly defused before the clock struck midnight—Q-Day won’t announce itself with a clear date or time. We won’t see computers suddenly crash or planes fall from the sky at a stroke of midnight. Instead, when quantum code-breaking arrives, the world might not notice anything visibly “wrong” at first. Websites will still load, apps

PostQuantum - Quantum Computing, Quantum Security, PQC
Boards: quantum risk isn’t just a tech problem – it’s a governance issue. Regulators increasingly hold boards accountable for cyber risks, and that extends to quantum threats. A future quantum breach could lead to major liability. Smart executives are asking their CISOs today: “Are we preparing for the quantum threat?” #QuantumResilience https://postquantum.com/post-quantum/quantum-threat-executives-board/
What is the Quantum Threat? A Guide for C‑Suite Executives and Boards

Boards do not need to dive into the scientific intricacies of qubits and algorithms, but they do need to recognize that this is a strategically important risk – one that can’t be simply delegated away. It requires the same level of governance attention as other enterprise-level risks like financial compliance, geopolitical factors, or pandemic preparedness. The comforting news is that if organizations act early, the quantum threat can be managed. Think of the proactive stance many companies took with Y2K in the late 1990s – those who started early averted disaster. Similarly here, those who begin preparing for quantum now

PostQuantum - Quantum Computing, Quantum Security, PQC
Canada’s approach to #QuantumResilience is thorough: a three-phase migration plan (Preparation - Identification - Transition). That means governance committees, staff training, PQC-ready procurement now, then a full sweep to find every place RSA/ECC lurks. By 2035 they aim to have eliminated legacy crypto entirely. Ambitious? Yes. Necessary? Absolutely. https://postquantum.com/industry-news/canada-pqc-roadmap
Government of Canada Launches Post-Quantum Cryptography (PQC) Migration Roadmap

On June 23, 2025 The Canadian Centre for Cyber Security (Cyber Centre) has issued a new roadmap for migrating the Government of Canada’s IT systems to post-quantum cryptography (PQC). Effective June 23, 2025, this guidance, 'Roadmap for the migration to post-quantum cryptography for the Government of Canada (ITSM.40.001)' lays out clear deadlines and expectations for all federal departments and agencies to transition their cryptographic systems to quantum-safe standards. It applies across non-classified federal IT systems, covering all Government of Canada networks handling UNCLASSIFIED, Protected A, and Protected B information (systems managing classified or Protected C data are addressed separately). The goal

PostQuantum - Quantum Computing, Quantum Security, PQC
Quantum tech = strategic autonomy for Europe. This strategy isn’t just science and industry – it’s about sovereignty. By investing in dual-use quantum (civil + defense) and building a homegrown talent pool, the EU aims to control its destiny in a future where quantum confers huge advantages (or vulnerabilities if left behind). #QuantumResilience #Quantum https://postquantum.com/industry-news/quantum-europe-strategy/
Quantum Europe Strategy: Europe’s Five-Pillar Plan to Lead the Quantum Revolution

On July 2, 2025, the European Commission unveiled the Quantum Europe Strategy – a comprehensive roadmap to transform Europe into a “quantum industrial powerhouse” and global leader in quantum technologies by 2030. This strategy arrives at a pivotal moment: quantum computing, communication, and sensing are advancing from lab experiments to real-world applications, promising breakthroughs from ultra-secure communications to revolutionary medical imaging.

PostQuantum - Quantum Computing, Quantum Security, PQC
Quantum threat is coming! In this new Cybercrime Radio podcast, Theresa Payton (Former White House CIO) and I discuss how #QuantumComputers could break today’s encryption in about 7 years. And what could and should we do now. https://www.linkedin.com/pulse/y2q-here-sooner-than-you-think-countdown-q-day-podcast-marin-ivezic-dnkpc/ #quantum #quantumsecurity #quantumthreat #pqc #postquantum #quantumresistance #quantumresilience #quantumcomputing
Y2Q Will Be Here Sooner Than You Think. The Countdown To Q-Day - Podcast Transcript

I recently spoke with Cybercrime Radio about the growing quantum computing threat. Theresa Payton, the former White House CIO, joined in and drew comparisons to the Y2K bug, noting that coordinated and early efforts can save us from bigger crises.