Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Bill Aims to Create National Strategy for Quantum Cybersecurity Migration

Bill Aims to Create National Strategy for Quantum Cybersecurity Migration

Posted on August 1, 2025August 1, 2025 By CWS

US senators Gary Peters (D-MI) and Marsha Blackburn (R-TN) have launched a brand new bipartisan invoice to determine a nationwide technique for migrating to quantum cybersecurity.

Per the ‘Nationwide Quantum Cybersecurity Migration Technique Act’, the White Home Workplace of Science and Know-how Coverage can be tasked with growing a coordinated technique for guaranteeing that federal authorities techniques are resilient to post-quantum threats.

The senators recommend utilizing current authorities experience by the Subcommittee on the Financial and Safety Implications of Quantum Science (ESIX), which would supply steering on securing knowledge previous to the extensive availability of quantum computer systems.

The invoice goals to handle the idea that quantum computer systems will break the present public key encryption (PKE), and builds on earlier laws, such because the ‘Nationwide Quantum Initiative Act’ and the ‘Quantum Cybersecurity Preparedness Act’.

As a result of stolen encrypted knowledge could be saved and decrypted utilizing quantum computer systems as soon as they develop into accessible, federal businesses ought to start their transition to post-quantum safety as quickly as attainable, the 2 senators say.

“It’s crucial that the federal authorities be ready for any risk posed by quantum computing know-how, particularly when it considerations our nationwide safety,” mentioned Senator Peters, rating member of the Senate Homeland Safety and Governmental Affairs Committee.

Though federal businesses have been lengthy inspired to make sure their knowledge is protected by quantum-resisting encryption, most of it stays both unencrypted or encrypted utilizing weak requirements, and senators Peters and Blackburn need to change that.

The invoice will set up a pilot program requiring each federal company emigrate not less than one high-impact system to quantum-safe encryption.Commercial. Scroll to proceed studying.

It additionally mandates the ESIX Subcommittee to guage which techniques want consideration, to determine standardized efficiency measures, and to obviously outline what a cryptographically related quantum laptop means.

“The Nationwide Quantum Cybersecurity Migration Technique Act would make sure the federal authorities creates a highway map to guard delicate knowledge and nationwide safety from rising knowledge safety threats fueled by quantum computing,” Senator Blackburn mentioned.

Associated: Cyber Insights 2025: Quantum and the Risk to Encryption

Associated: MITRE Publishes Submit-Quantum Cryptography Migration Roadmap

Associated: Submit-Quantum Cryptography Requirements Formally Introduced by NIST – a Historical past and Rationalization

Associated: Tech Giants Kind Submit-Quantum Cryptography Alliance

Security Week News Tags:Aims, Bill, Create, Cybersecurity, Migration, National, Quantum, Strategy

Post navigation

Previous Post: Search Engines are Indexing ChatGPT Conversations!
Next Post: Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks

Related Posts

Anubis Ransomware Packs a Wiper to Permanently Delete Files Anubis Ransomware Packs a Wiper to Permanently Delete Files Security Week News
The Congressional Budget Office Was Hacked. It Says It Has Implemented New Security Measures The Congressional Budget Office Was Hacked. It Says It Has Implemented New Security Measures Security Week News
Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities Security Week News
TARmageddon Flaw in Popular Rust Library Leads to RCE TARmageddon Flaw in Popular Rust Library Leads to RCE Security Week News
Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 Security Week News
Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News