{"id":5325,"date":"2026-03-27T12:40:03","date_gmt":"2026-03-27T04:40:03","guid":{"rendered":"http:\/\/longzhuplatform.com\/?p=5325"},"modified":"2026-03-27T12:40:03","modified_gmt":"2026-03-27T04:40:03","slug":"ai-investments-must-go-hand-in-hand-with-quantum-safe-security-says-ibms-subhathra-srinivasaraghavan","status":"publish","type":"post","link":"http:\/\/longzhuplatform.com\/?p=5325","title":{"rendered":"AI investments must go hand-in-hand with quantum-safe security, says IBM&#039;s Subhathra Srinivasaraghavan"},"content":{"rendered":"<p><\/p> <div> <p>As enterprises double down on artificial intelligence (AI) infrastructure, a quieter but equally critical shift is underway, preparing systems for a post-quantum world. While quantum computing may still seem distant, industry leaders warn that the transition to quantum-safe security cannot be delayed.<\/p> <p>In an interview with <em>Business Today<\/em>, Subhathra Srinivasaraghavan, Vice President at IBM ISDL, says enterprises need to rethink security as a long-term architectural decision rather than a reactive upgrade.<\/p> <p>\u201cMaking systems quantum safe is a long-term journey. Enterprises cannot wait until quantum computing becomes mainstream,\u201d she told <em>Business Today<\/em>.<\/p> <p><strong>The looming quantum threat<\/strong><\/p> <p>At the heart of the urgency is the risk that current encryption standards, considered secure today, may not hold up against future quantum computers.<\/p> <p>\u201cOne of the fundamentals of security today is encryption, which protects data from unauthorised access. Current encryption algorithms are secure because classical computers cannot break them easily,\u201d Srinivasaraghavan said.<\/p> <p>However, that assumption breaks down in a quantum future.<\/p> <p>\u201cQuantum computers will be able to try multiple combinations simultaneously, making it much easier to break these algorithms,\u201d she explained.<\/p> <p>This creates what security experts call a \u201charvest now, decrypt later\u201d scenario.<\/p> <p>\u201cMalicious actors can store encrypted data today and decrypt it later when quantum capabilities become available,\u201d she warned, adding that sectors like finance are especially exposed due to the long-term value of their data.<\/p> <p><strong>Why the shift must start now<\/strong><\/p> <p>Unlike typical technology upgrades, quantum-safe readiness cannot be implemented overnight. It requires changes across infrastructure, applications and encryption strategies.<\/p> <p>\u201cEnterprises need to evaluate their infrastructure first, whether it is quantum safe, and then assess their applications,\u201d Srinivasaraghavan told <em>Business Today<\/em>. \u201cThis is a long-term journey that spans the entire stack.\u201d<\/p> <p>IBM has already begun embedding quantum-safe capabilities into its systems. \u201cIn our latest systems like Z17, Power11 and LinuxONE5, we have replaced traditional encryption algorithms with quantum-safe ones,\u201d she said.<\/p> <p>The company is also working with global standards bodies such as the National Institute of Standards and Technology (NIST) to develop encryption algorithms that can withstand quantum attacks.<\/p> <p><strong>AI and security are now inseparable<\/strong><\/p> <p>As companies pour billions into AI, Srinivasaraghavan argues that security, and specifically quantum-safe security, must be built into those investments from day one.<\/p> <p>\u201cAI and quantum-safe security should not be treated as separate investments. AI depends on data and that data must be secure,\u201d she told <em>Business Today<\/em>.<\/p> <p>This becomes particularly important as enterprises increasingly rely on proprietary datasets to differentiate their AI capabilities.<\/p> <p>\u201cEnterprises differentiate their AI value through proprietary data, so protecting that data is critical,\u201d she added.<\/p> <p><strong>Architectural decisions will define future costs<\/strong><\/p> <p>One of the biggest risks for enterprises is deferring these decisions and facing costly retrofits later.<\/p> <p>\u201cEnterprises need to make intentional architectural decisions. Some data must remain on-premises for control, while other workloads can move to the cloud,\u201d she said.<\/p> <p>Beyond location, the question of data sovereignty, how data is accessed and used, is becoming central to infrastructure planning.<\/p> <p>\u201cFrom hardware to software to applications, enterprises must evaluate encryption strategies and ensure they are future-proof,\u201d she said.<\/p> <p><strong>India\u2019s readiness\u00a0<\/strong><\/p> <p>In India, awareness around quantum-safe security is growing, particularly in regulated sectors such as banking and financial services.<\/p> <p>\u201cIndian enterprises, especially in regulated sectors, have always focused strongly on security,\u201d Srinivasaraghavan told <em>Business Today<\/em>.<\/p> <p>Regulatory developments such as the Digital Personal Data Protection (DPDP) Act and guidance from the Reserve Bank of India are pushing organisations to take a more proactive approach.<\/p> <p>At the same time, government initiatives like the National Quantum Mission are helping build a broader ecosystem.<\/p> <p>Despite rising awareness, widespread adoption may still depend on external triggers.<\/p> <p>\u201cThere are multiple triggers, advances in quantum computing, stricter regulations and geopolitical concerns,\u201d Srinivasaraghavan said. \u201cDifferent enterprises may respond to different triggers, but all of these factors are already in play.\u201d<\/p> <\/div> <p>quantum computing, quantum safe security, data security, enterprise data security, harvest now decrypt later, IBM ISDL, Subhathra Srinivasaraghavan, data sovereignty, data protection<br \/> #investments #handinhand #quantumsafe #security #IBM039s #Subhathra #Srinivasaraghavan1774586403<\/p> ","protected":false},"excerpt":{"rendered":"<p>As enterprises double down on artificial intelligence (AI) infrastructure, a quieter but equally critical shift is underway, preparing systems for a post-quantum world. While quantum computing may still seem distant, industry leaders warn that the transition to quantum-safe security cannot be delayed. In an interview with Business Today, Subhathra Srinivasaraghavan, Vice President at IBM ISDL, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5326,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[9922,19758,19763,19759,19764,19760,19761,19766,7452,19756,19757,19765,3449,19768,19767,19762],"class_list":["post-5325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-content-marketing","tag-data-protection","tag-data-security","tag-data-sovereignty","tag-enterprise-data-security","tag-handinhand","tag-harvest-now-decrypt-later","tag-ibm-isdl","tag-ibm039s","tag-investments","tag-quantum-computing","tag-quantum-safe-security","tag-quantumsafe","tag-security","tag-srinivasaraghavan","tag-subhathra","tag-subhathra-srinivasaraghavan"],"acf":[],"_links":{"self":[{"href":"http:\/\/longzhuplatform.com\/index.php?rest_route=\/wp\/v2\/posts\/5325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/longzhuplatform.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/longzhuplatform.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/longzhuplatform.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/longzhuplatform.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5325"}],"version-history":[{"count":0,"href":"http:\/\/longzhuplatform.com\/index.php?rest_route=\/wp\/v2\/posts\/5325\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/longzhuplatform.com\/index.php?rest_route=\/wp\/v2\/media\/5326"}],"wp:attachment":[{"href":"http:\/\/longzhuplatform.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/longzhuplatform.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5325"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/longzhuplatform.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}