Featured

Published on December 13th, 2022 📆 | 3546 Views ⚑

0

National security updates en route as Quantum Computing Cybersecurity Preparedness Act passes Congress


https://www.ispeech.org/text.to.speech

© Shutterstock

Following its passage from the Senate last week, the Quantum Computing Cybersecurity Preparedness Act officially navigated both chambers of Congress, setting up changes to national security through new quantum computer defenses if signed into law by President Joe Biden.

The bill (H.R.7535) was introduced by U.S. Sens. Rob Portman (R-OH) and Maggie Hassan (D-NH) in the Senate and U.S. Reps. Nancy Mace (R-SC) and Ro Khanna (D-CA) in the House as a bipartisan, bicameral push to make federal agencies more proactive on cybersecurity protections. Much of the onus would be on the Office of Management and Budget (OMB), though, to prioritize the acquisition and migration of federal agencies’ information technology to post-quantum cryptography, as well as create guidance for other agencies to assess their critical systems.

“Quantum computing will provide for huge advances in computing power, but it will also create new cybersecurity challenges,” Portman said. “I’m pleased the Senate passed our bipartisan legislation to require the government to inventory its cryptographic systems, determine which are most at risk from quantum computing, and upgrade those systems accordingly.”





The lawmakers most feared data breaches enabled by advances in technology, particularly as quantum computers become more powerful and more widely available. From the moment the National Institute of Standards and Technology (NIST) releases planned post-quantum cryptography standards for critical systems, under the legislation, the OMB would have one year to create guidance for its fellow agencies. It would also have to dispatch an annual report to Congress inclusive of a strategy to address post-quantum cryptography risks, the funding required, and an analysis of government coordination and action on the matter.

“America’s adversaries look for any vulnerabilities in our cybersecurity systems in order to threaten our infrastructure, data, and security,” Hassan said. “It is crucial that we are ready to defend against any adversaries using this incredibly sophisticated and emerging technology against our country.”

Source link

Tagged with:



Comments are closed.