October 2025
As we celebrate Cyber Security Awareness Month, this week’s focus is on one of the most transformative - and potentially disruptive - technologies on the horizon: quantum computing.
While quantum technology promises breakthroughs in areas like data processing and scientific discovery, it also presents a significant challenge to how we protect information today. A cryptographically-relevant quantum computer - one powerful enough to break current encryption methods - could render many of our existing security protocols obsolete.
That means the communications and data we consider secure today may not be tomorrow.
Most of our digital security relies on public-key encryption - the foundation of secure online banking, messaging, and data protection. Algorithms such as RSA and ECC, which safeguard this information, are vulnerable to attack by quantum computers.
Once a cryptographically-relevant quantum computer becomes available, it could decrypt historical data that was intercepted and stored today - a threat known as “harvest now, decrypt later.”
The Australian Signals Directorate (ASD) is encouraging all organisations to prepare for this reality by transitioning to post-quantum cryptography (PQC) by 2030. That may sound distant, but for most organisations the change will take years of planning, testing, and coordination.
To help guide the transition, ASD has introduced the LATICE framework, a structured approach for identifying and replacing vulnerable cryptographic systems:
L – Locate and catalogue the use of traditional asymmetric cryptography across your organisation.
A – Assess the value and sensitivity of systems and data protected by that cryptography.
T – Triage systems and prioritise which ones to transition first based on risk.
I – Implement post-quantum cryptographic algorithms throughout your infrastructure.
C – Communicate with vendors, partners, and stakeholders to coordinate migration efforts.
E – Educate and train relevant staff on PQC and what it means for your organisation’s security posture.
This framework not only supports technical readiness, but also helps ensure that leadership and staff understand the business implications of quantum change.
Quantum computing may still be emerging, but its impact on cybersecurity is certain. The time to act is now - not when the first quantum computer arrives.
Organisations should start by:
Conducting a cryptographic inventory to understand where and how encryption is used.
Working with vendors to ensure future-proof products and upgrades.
Educating teams about PQC and its role in long-term data protection.
The transition to post-quantum cryptography is not just a technical shift - it’s a strategic investment in the future of secure digital operations.
🔗 Learn more about preparing for post-quantum cryptography:
ASD: Planning for Post-Quantum Cryptography
At Matrium Technologies, we recognise the urgency of this transition. By partnering with VIAVI Solutions, which provides deep expertise in performance and security testing of post-quantum cryptographic algorithms and network protocols, we bring you a comprehensive service to help you move from awareness to action.
In short: we help you move from “we should be preparing” to “we are actively transitioning”. Don’t wait until quantum causes a breakdown in trust or a breach you didn’t see coming. Matrium, alongside VIAVI’s PQC-ready testing and validation tools, provides the support and expertise to safeguard your digital infrastructure now and into the future.