{"id":97258,"date":"2026-05-20T13:32:38","date_gmt":"2026-05-20T10:32:38","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=97258"},"modified":"2026-05-20T13:35:19","modified_gmt":"2026-05-20T10:35:19","slug":"opinion-ai-and-quantum-technologies-threaten-corporate-security","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/opinion-ai-and-quantum-technologies-threaten-corporate-security\/","title":{"rendered":"Opinion: AI and Quantum Technologies Threaten Corporate Security"},"content":{"rendered":"<p>The identification infrastructure of companies in the Asia-Pacific region (APAC) is struggling to cope with the current level of threats posed by artificial intelligence. This was stated by Keeper Security CEO Darren Guccione in a column for <a href=\"https:\/\/smbtech.au\/thought-leadership\/the-identity-stack-is-broken-why-ai-and-quantum-threaten-apac-enterprises-now\/\">SMBtech<\/a>.<\/p>\n<p>AI has simplified the scaling of attacks on accounts and access systems, and the quantum threat is no longer a &#8220;problem of the distant future,&#8221; the expert stated, citing the Keeper Security Identity Security at Machine Speed report.<\/p>\n<p>According to the report, 83% of cybersecurity and IT leaders in APAC pointed to the increasing complexity of potential threats. Nearly half of the respondents (47%) directly linked this to AI attacks.<\/p>\n<p>Another issue is cloud security. In the region, 46% of companies consider it the main weak point in their defenses.<\/p>\n<p>Guccione also noted the rise in the number of new &#8220;digital identities.&#8221; 38% of companies in APAC are under pressure due to the increase in accounts and associated identifiers.<\/p>\n<p>Furthermore, 53% of organizations reported issues with interacting with non-human users\u2014service accounts, <span data-descr=\"application programming interface\" class=\"old_tooltip\">API<\/span> tokens, and credentials for automation. These are appearing faster than companies can establish control.<\/p>\n<p>Many organizations continue to use SMS authentication. In APAC, this method is used by 36% of companies, and in China\u2014by 40%.<\/p>\n<p>The expert considers SMS one of the most vulnerable elements of protection. He highlighted the risks of SIM swapping, real-time phishing, and social engineering using AI.<\/p>\n<p>Against this backdrop, 41% of companies in the region have already implemented phishing-resistant <span data-descr=\"multi-factor authentication\" class=\"old_tooltip\">MFA<\/span>\u2014<span data-descr=\"open standard for passwordless authentication based on cryptographic keys\" class=\"old_tooltip\">FIDO2<\/span>, hardware security keys, and <span data-descr=\"'passkeys'\u2014a protection method using biometrics (FaceID, fingerprint)\" class=\"old_tooltip\">passkeys<\/span>. However, only 26% of organizations have fully transitioned to the latest and most secure type of protection.<\/p>\n<p>Meanwhile, 64% of companies worldwide still lack a fully operational <span data-descr=\"Privileged Access Management\" class=\"old_tooltip\">PAM<\/span> system. In APAC, such a mechanism is implemented in 38% of organizations, and in Japan\u2014only 22%.<\/p>\n<h2 class=\"wp-block-heading\">Quantum Threat and New Standards<\/h2>\n<p>The second part of the column addresses the quantum threat. According to Guccione, the harvest now, decrypt later scenario cannot be considered purely theoretical. Malefactors are already accumulating encrypted data, intending to crack it once powerful quantum computers become available.<\/p>\n<p>At risk is information with a long lifespan: financial reports, intellectual property, and identification infrastructure.<\/p>\n<p>Guccione noted that in August 2024, the <span data-descr=\"National Institute of Standards and Technology\" class=\"old_tooltip\">NIST<\/span> <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2024\/08\/nist-releases-first-3-finalized-post-quantum-encryption-standards\">approved<\/a> the first post-quantum cryptography standards\u2014FIPS 203, FIPS 204, and FIPS 205.<\/p>\n<p>In March 2025, the British <span data-descr=\"National Cyber Security Centre\" class=\"old_tooltip\">NCSC<\/span> <a href=\"https:\/\/www.ncsc.gov.uk\/news\/pqc-migration-roadmap-unveiled\">released<\/a> a roadmap for migration to post-quantum encryption. The document suggests:<\/p>\n<ul class=\"wp-block-list\">\n<li>conducting an inventory of crypto-dependent systems by 2028;<\/li>\n<li>completing priority migrations by 2031;<\/li>\n<li>finalizing the transition by 2035.<\/li>\n<\/ul>\n<p>SMBtech cites this timeline as a signal that preparation can no longer be postponed.<\/p>\n<p>Following the publication of NIST standards, Cloudflare <a href=\"https:\/\/blog.cloudflare.com\/nists-first-post-quantum-standards\/\">called<\/a> them a significant milestone for protecting modern communications in the world of quantum computing. The OpenID Foundation also <a href=\"https:\/\/openid.net\/post-quantum-identity-standards\/\">warned<\/a> that the threat affects tokens, certificates, and <span data-descr=\"cryptographic protocol that ensures secure data transmission between a computer and a server on the internet\" class=\"old_tooltip\">TLS<\/span>\u2014the basic elements of modern identification infrastructure.<\/p>\n<p>Practical suggestions for improving security include:<\/p>\n<ul class=\"wp-block-list\">\n<li>abandoning SMS authentication;<\/li>\n<li>accelerating the implementation of passkeys and MFA;<\/li>\n<li>inventorying cryptographic dependencies before transitioning to hybrid and post-quantum schemes.<\/li>\n<\/ul>\n<p>Back in May, Cisco&#8217;s Global Director of Innovation Guy Diedrich <a href=\"https:\/\/forklog.com\/en\/news\/cisco-prepares-network-infrastructure-for-quantum-leap\">announced<\/a> that the company would prepare its network infrastructure ahead of the quantum leap.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The identification infrastructure of companies in the Asia-Pacific region is struggling with current threats due to AI.<\/p>\n","protected":false},"author":1,"featured_media":97259,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"AI and quantum technologies threaten corporate security in APAC.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[438,1138,575,1360],"class_list":["post-97258","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-artificial-intelligence","tag-opinions","tag-quantum-computers","tag-quantum-computing"],"aioseo_notices":[],"amp_enabled":true,"views":"13","promo_type":"1","layout_type":"1","short_excerpt":"AI and quantum technologies threaten corporate security in APAC.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/97258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=97258"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/97258\/revisions"}],"predecessor-version":[{"id":97260,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/97258\/revisions\/97260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/97259"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=97258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=97258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=97258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}