The promise of quantum computing is tantalizing. Tasks that would have taken hundreds or thousands of years using traditional binary computers can instead be completed in days or even hours.
But there is an old saying that every solution carries the seeds of the next problem. This holds true for the post-quantum world. All the current encryption and credential tools used to protect data and identity will be easy prey to quantum hacking and rendered effectively useless.
However, that doesn’t have to happen if governments, industries, and organizations start preparing for a post-quantum environment now.