The Quantum List Updated: Companies leveraging quantum effects for real world functionality and security
OODA is tracking almost 1300 firms that leverage quantum effects to provide real world functionality. Of these we have selected 23 to bring to our network’s attention because of our judgment of the importance these firms are already playing in domains of Quantum Computing, Quantum Security, Quantum Communications and Quantum Sensing.
Vikram Sharma is the CEO of QuintessenceLabs, a company he founded to leverage an understanding of how physics works at the quantum level to address some of the biggest issues in cybersecurity. In this discussion at OODAcon, Vikram provided a high level overview of what years of quantum theory and 1000’s of experiments on the nature of reality tell us about the nature of reality, especially reality when measured at the smallest scale.
His insights into the world of quantum mechanics includes a description of some of some very strange observations, which are seen again and again in experiment after experiment.
In this OODAcast we dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring your data remains safe even after quantum computers can break current asymmetric encryption methods. Our guest, Dr. Jane Melia of QuintessenceLabs, is a practitioner who has spent years helping create and bring to market advanced enterprise technologies. She also has a reputation for being able to explain the business impact of technologies in terms conducive to making operational decisions. This skill is a highly needed one in the domain of quantum effects.
Every year during the RSA season OODA provides an updated list of what we see as the tech firms with the greatest potential to disrupt the cybersecurity market and improve an organization’s ability to manage cyber risk. We base the firms we track in this list off of our own continuous market research and then use the activities around RSA to interview company leaders and other industry professionals to select the firms we believe warrant special focus by the community.
The resulting list can serve multiple stakeholders. Investors can find firms that have demonstrated good product-market fit and are good candidates for follow-on funding. CISOs can find companies that have demonstrated real disruptive technology potential and at least enough traction to prove they are worth considering. And larger tech firms can find interesting businesses worth tracking for potential partnering and, perhaps later in the firm’s lifecycle, for potential M&A.
The Executive’s Guide To Quantum Safe Security: Take these steps to make your enterprise quantum proof
The steady progress in quantum computing is resulting in exciting developments that will one day bring new capabilities to a wide range of use cases. Quantum computers can also bring new capabilities to attackers. The mathematician Peter Shor has proven that quantum computers can be used to rapidly factor large numbers into their primes in a way that will break most forms of asymmetric encryption used today. The computer scientist Lov Grover proved another algorithm that will, among other things, enable incredibly fast invalidation of another tool for security, the security hash. There are certainly other ways quantum computers will be used by adversaries, but these two methods alone are cause for serious concern. Imagine all the data your company believes is important being read by an adversary that wants to put you out of business, and imagine that adversary is operating in a location untouchable by the rule of law.