Even though large quantum computers that can break the RSA encryption code using Shor’s algorithm are still many years away, Inside Quantum Technology has just published a blog article that describes two situations where it may be wise to talk to your customers and recommend they start taking action now.  The first situation is one where an organization possesses data with a high value and a high shelf life and they want to protect it against an adversary using a “Harvest and Decrypt” strategy.  The second situation is one where a device has a long life cycle (like an automobile) and supports firmware updates that are certified with a digital signature.  You would not want a malevolent actor to install bogus firmware as part of an update and certify it with a seemingly valid, but forged, digital signature created using a quantum computer.   Click here to read the full article.