International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 0

Informative Article | Computer and Mathematical Sciences | Volume 15 Issue 2, February 2026 | Pages: 1237 - 1238 | United States


AI Threat or Quantum Threat - How Enterprises Should be Prepared

Manonmayi Vedam

Abstract: The growing concern around AI-driven cyber threats has often overshadowed a deeper structural weakness within enterprise security systems, namely the fragile state of cryptographic foundations that were never built for long-term resilience. While artificial intelligence amplifies the speed and scale of attacks, quantum computing introduces a more disruptive possibility, the obsolescence of widely used public-key encryption. The release of post-quantum algorithms by the National Institute of Standards and Technology marks an important milestone; however, the broader challenge extends beyond algorithm selection to issues of data sovereignty, interoperability, and delayed preparedness. Sensitive assets such as financial systems, healthcare records, national security data, and intellectual property remain exposed under a harvest now, decrypt later strategy already adopted by adversaries. This situation calls for a shift from reactive cybersecurity measures toward crypto-agility, where enterprises actively assess cryptographic inventories, align with emerging standards, embed quantum-resistant mechanisms, and integrate intelligent threat detection with durable encryption strategies. Leading cloud and technology providers including IBM, AWS, Microsoft Azure, and Google Cloud Platform have begun operationalizing quantum-safe initiatives through structured discovery, migration roadmaps, hybrid cryptographic models, and enterprise-wide inventory assessments. The transition toward quantum-safe security is not a temporary fix but a long-term architectural transformation aimed at ensuring governance, compliance, and institutional survival in an evolving threat landscape.

Keywords: Quantum-safe encryption, post-quantum cryptography, Crypto-agility, Data sovereignty, Harvest now decrypt later

How to Cite?: Manonmayi Vedam, "AI Threat or Quantum Threat - How Enterprises Should be Prepared", Volume 15 Issue 2, February 2026, International Journal of Science and Research (IJSR), Pages: 1237-1238, https://www.ijsr.net/getabstract.php?paperid=SR26221063650, DOI: https://dx.dx.doi.org/10.21275/SR26221063650

Download Citation: APA | MLA | BibTeX | EndNote | RefMan


Download Article PDF


Rate This Article!


Top