Close Menu
Alpha Leaders
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
What's On
Bob Diamond: The settlement window is closing as 24/7 trading opens up

Bob Diamond: The settlement window is closing as 24/7 trading opens up

30 April 2026
How AstraZeneca’s 17,000 AI-certified employees are helping it reach an  billion ‘stretch goal’

How AstraZeneca’s 17,000 AI-certified employees are helping it reach an $80 billion ‘stretch goal’

30 April 2026
Why your data infrastructure — not your AI model — will determine whether Agentic AI scales

Why your data infrastructure — not your AI model — will determine whether Agentic AI scales

30 April 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Alpha Leaders
newsletter
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
Alpha Leaders
Home » I oversee a lab where engineers try to destroy my life’s work. It’s the only way to prepare for quantum threats
News

I oversee a lab where engineers try to destroy my life’s work. It’s the only way to prepare for quantum threats

Press RoomBy Press Room18 January 20266 Mins Read
Facebook Twitter Copy Link Pinterest LinkedIn Tumblr Email WhatsApp
I oversee a lab where engineers try to destroy my life’s work. It’s the only way to prepare for quantum threats

The first time I handed over my credit card to a security lab, it came back to me broken. Not physically damaged, but compromised. In less than 10 minutes, the engineers had discovered my PIN.

This happened in the early 1990s, when I was a young engineer starting an internship at one of the companies that helped create the smart card industry. I believed my card was secure. I believed the system worked. But watching strangers casually extract something that was supposed to be secret and protected was a shock. It was also the moment I realized how insecure security actually is, and the devastating impact security breaches could have on individuals, global enterprises, and governments.

Most people assume security is about building something that’s unbreakable. In reality, security is about understanding exactly how something breaks, under what conditions, and how quickly. That is why, today, I run labs where engineers are paid to attack the very chips my company designs. They measure power fluctuations, inject electromagnetic signals, fire lasers, and strip away layers of silicon. Their job is to behave like criminals and hostile nation-states on purpose, because the only honest way to build trust is to try to destroy it first.

To someone outside the security world, this approach sounds counterintuitive. Why spend years designing secure hardware, only to invite people to tear it apart? The answer is straightforward: Trust that has never been tested is not trust. It is assumption. Assumptions fail quietly at first, and they fail at the worst possible moment.

Over the past three decades, I have watched secure chips move from a specialized technology into invisible infrastructure. Early in my career, much of my work focused on payment cards. Convincing banks and payment networks that a chip was safer than a magnetic stripe was not easy. At the time, there were fears about surveillance and tracking. What few people recognized was that these chips were becoming digital passports. They proved identity, authenticated devices, and determined what could and could not be trusted on a network.

Today, secure chips sit quietly inside credit cards, smartphones, cars, medical devices, home routers, industrial systems, and national infrastructure. Most people never notice them, which is often taken as a sign of success. In reality, that invisibility also creates risk. When security disappears from view, it is easy to forget that it must still evolve.

At a basic level, a secure chip does one essential thing. It protects a secret – a cryptographic identity that proves a device is genuine. All other security measures build upon that foundation. When a phone unlocks, when a car communicates with a charging station, when a medical sensor sends data to a hospital, or when a software update is delivered to a device in the field, all of those actions depend on that secret remaining secret.

The challenge is that chips do not simply store secrets. They use them. They calculate, communicate, and respond. The moment a chip does that, it begins to leak information. Not because it is poorly designed, but because physics cannot be negotiated. Power consumption shifts. Electromagnetic emissions change. Timing varies. With the right equipment and enough expertise, those signals can be measured and interpreted.

This is what happens inside our attack labs every day. Engineers listen to chips in much the same way an electricity provider can infer your daily routine from your power usage. They stress-test devices until they behave differently than intended. They introduce faults and observe how the chip responds. From those observations, they learn how an attacker would think, where information escapes, and how defenses must be redesigned.

Quantum computing enters this picture without drama or science fiction. Quantum does not change what attackers are after – they still want the secret. What quantum changes is the speed at which they can get it. Problems that would take classical computers thousands of years can collapse to minutes or seconds once sufficient quantum capability exists. The target remains the same. The timeline disappears.

This is why static security fails. Any system designed to be secure once and then left untouched is already aging toward obsolescence. If a system is never attacked, it will eventually fail, because the world around it does not stand still. Attack techniques evolve and improve. Tools become cheaper, more powerful, and more accessible – especially in the age of Artificial Intelligence. Knowledge about successful attacks spread globally, emboldening others to seek similar successes. 

Many organizations make the same mistake. They assume they will see the threat coming. They wait for visible breaches or public incidents before acting. With quantum, that logic breaks down. The first actors with meaningful quantum capability will not announce it. They will use it quietly. In fact, this is already happening now with Harvest Now-Decrypt Later (HNDL) attacks, where large amounts of encrypted data is collected and stored today for future quantum decryption. By the time attacks become obvious, the damage will already be done.

That reality is why governments and regulators are moving now. Across industries, requirements are emerging that systems must become quantum resilient within defined timelines. This is not driven by theory or hype. It is driven by the simple fact that updating cryptography, hardware, and infrastructure takes years, while exploiting weaknesses can take moments.

When I walk through our labs today, what strikes me most is not the sophistication of the tools, but the discipline of the process. Access is tightly controlled. Engineers are vetted and audited. Every experiment is documented. This is not curiosity-driven hacking. It is structured, repeatable testing designed to surface weaknesses early, while there is still time to fix them. Every successful attack becomes an input for a stronger design.

This is what leaders, system owners, and policymakers need to understand. Security does not fail suddenly. It fails quietly, long before anyone notices. Preparing for quantum threats is not about predicting the exact moment a breakthrough occurs. It is about accepting that once it does, there will be no grace period. The only responsible approach is to assume your systems will be attacked and to make sure that happens under controlled conditions, before someone else decides the timing for you.

The opinions expressed in Fortune.com commentary pieces are solely the views of their authors and do not necessarily reflect the opinions and beliefs of Fortune.

cyber quantum computing
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link

Related Articles

Bob Diamond: The settlement window is closing as 24/7 trading opens up

Bob Diamond: The settlement window is closing as 24/7 trading opens up

30 April 2026
How AstraZeneca’s 17,000 AI-certified employees are helping it reach an  billion ‘stretch goal’

How AstraZeneca’s 17,000 AI-certified employees are helping it reach an $80 billion ‘stretch goal’

30 April 2026
Why your data infrastructure — not your AI model — will determine whether Agentic AI scales

Why your data infrastructure — not your AI model — will determine whether Agentic AI scales

30 April 2026
Mohammed El-Erian: Global recession could happen within a month if Strait of Hormuz stays closed

Mohammed El-Erian: Global recession could happen within a month if Strait of Hormuz stays closed

30 April 2026
The 5 billion question: Will Big Tech’s AI gamble pay off?

The $665 billion question: Will Big Tech’s AI gamble pay off?

30 April 2026
Thom Tillis: Free markets built American prosperity. Government intervention puts it at risk

Thom Tillis: Free markets built American prosperity. Government intervention puts it at risk

30 April 2026
Don't Miss
Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

By Press Room27 December 2024

Every year, millions of people unwrap Christmas gifts that they do not love, need, or…

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

30 December 2024
Moltbook is the talk of Silicon Valley. But the furor is eerily reminiscent of a 2017 Facebook research experiment

Moltbook is the talk of Silicon Valley. But the furor is eerily reminiscent of a 2017 Facebook research experiment

6 February 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Latest Articles
The 5 billion question: Will Big Tech’s AI gamble pay off?

The $665 billion question: Will Big Tech’s AI gamble pay off?

30 April 20262 Views
Thom Tillis: Free markets built American prosperity. Government intervention puts it at risk

Thom Tillis: Free markets built American prosperity. Government intervention puts it at risk

30 April 20263 Views
The debt crisis Congress has been ignoring could cost the average U.S. household ,000 a year

The debt crisis Congress has been ignoring could cost the average U.S. household $18,000 a year

30 April 20262 Views
Meet all 37 White House ballroom donors funding the 0 million build

Meet all 37 White House ballroom donors funding the $400 million build

30 April 20263 Views

Recent Posts

  • Bob Diamond: The settlement window is closing as 24/7 trading opens up
  • How AstraZeneca’s 17,000 AI-certified employees are helping it reach an $80 billion ‘stretch goal’
  • Why your data infrastructure — not your AI model — will determine whether Agentic AI scales
  • Mohammed El-Erian: Global recession could happen within a month if Strait of Hormuz stays closed
  • The $665 billion question: Will Big Tech’s AI gamble pay off?

Recent Comments

No comments to show.
About Us
About Us

Alpha Leaders is your one-stop website for the latest Entrepreneurs and Leaders news and updates, follow us now to get the news that matters to you.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks
Bob Diamond: The settlement window is closing as 24/7 trading opens up

Bob Diamond: The settlement window is closing as 24/7 trading opens up

30 April 2026
How AstraZeneca’s 17,000 AI-certified employees are helping it reach an  billion ‘stretch goal’

How AstraZeneca’s 17,000 AI-certified employees are helping it reach an $80 billion ‘stretch goal’

30 April 2026
Why your data infrastructure — not your AI model — will determine whether Agentic AI scales

Why your data infrastructure — not your AI model — will determine whether Agentic AI scales

30 April 2026
Most Popular
Mohammed El-Erian: Global recession could happen within a month if Strait of Hormuz stays closed

Mohammed El-Erian: Global recession could happen within a month if Strait of Hormuz stays closed

30 April 20263 Views
The 5 billion question: Will Big Tech’s AI gamble pay off?

The $665 billion question: Will Big Tech’s AI gamble pay off?

30 April 20262 Views
Thom Tillis: Free markets built American prosperity. Government intervention puts it at risk

Thom Tillis: Free markets built American prosperity. Government intervention puts it at risk

30 April 20263 Views

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • March 2022
  • January 2021
  • March 2020
  • January 2020

Categories

  • Blog
  • Business
  • Entrepreneurs
  • Global
  • Innovation
  • Leadership
  • Living
  • Money & Finance
  • News
  • Press Release
© 2026 Alpha Leaders. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.