Skip to content
  Sunday 9 November 2025
Trending
October 13, 2023Platinion Senior Consultant, Cybersecurity September 30, 2024<h3>Texas Hospital Halts Ambulances After Shocking Attack</h3> November 15, 2023Multi-Tenant Virtualized Environments Affected by New Vulnerability in Intel CPUs January 24, 2025Discover: Massive Security Breach Uncovered in LTE and 5G Networks September 16, 2025Apple Quickly Fixes Critical Security Vulnerability Exploited in Advanced Spyware Attack January 12, 2022Nmap Cheat Sheet 2022 (PDF) – 100+ Nmap Commands List March 24, 2025<h3>Prioritize ‘Secure by Design’ in Software Development!</h3> March 17, 2025Cybersecurity Specialist August 6, 2024Account Executive – Secureworks Cybersecurity Sales – US Remote Philadelphia March 15, 2024Chrome Users Now Benefit from Enhanced Real-Time URL Protection Introduced by Google
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  

UK NCSC Announces 2035 Deadline for Quantum-Proof Transition

Industry News

UK NCSC Announces 2035 Deadline for Quantum-Proof Transition

SecuredyouadmSecuredyouadm—March 20, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Children’s Hospital Reinstates EHRs, Patient Portal Remains Offline

March 8, 2024

Advantages of Implementing Data Management Regulations for Consumers and Businesses

November 29, 2023

$3,000 Android Trojan Threatening Banks and Cryptocurrency Exchanges

December 5, 2024

US Extradition of Alleged RaidForums Admin Hits a Standstill

September 24, 2025



The UK’s National Cyber Security Center (NCSC) has set a 2035 deadline for critical infrastructure operators to transition to post-quantum cryptography, anticipating the advent of quantum computers that could potentially compromise current encryption algorithms. In a recent advisory, the NCSC outlined a structured timeline aimed at technical decision-makers and risk owners within large organizations and operators of critical national infrastructure. The guidance includes a phased approach, urging organizations to assess their IT systems and draft a migration plan by 2028, transition high-priority systems by 2031, and complete the overall shift by 2035.

Emphasizing the importance of this transition, the NCSC suggests that organizations view this migration as a chance to enhance their overall cybersecurity resilience. Although quantum computing remains largely in the research phase, experts warn that the transition to post-quantum computing is urgent, as a “cryptanalytically relevant quantum computer” could emerge in the early 2030s. Such a computer would have the capability to decrypt information currently safeguarded by traditional encryption methods.

In response to these impending changes, the U.S. National Institute of Standards and Technology (NIST) finalized three post-quantum encryption algorithms in August 2024, setting a precedent for cryptographic standards worldwide. Tech giants, including Google and Microsoft, are also preparing for this technological shift by integrating post-quantum capabilities into their products. The NCSC advises organizations to upgrade to platforms that support post-quantum cryptography, replacing outdated public key cryptography components and phasing out existing IT services.

One of the significant challenges highlighted by the NCSC is the replacement of existing web public key infrastructure and industrial control system protocols, due to their incompatibility with post-quantum cryptography. The agency recommends flexibility in migration plans to accommodate future developments in the ecosystem. Tim Callan, chief compliance officer at Sectigo, noted that systems reliant on RSA and ECC cryptographic algorithms would face difficulties in integrating new algorithms and would require substantial overhauls.

In conclusion, organizations are urged to begin their transition to post-quantum cryptography without delay to ensure security and compliance in the quantum era. While the task is challenging, early and strategic planning can facilitate a smooth transition, safeguarding critical infrastructure against future threats posed by quantum computing advancements.

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Elevate Your Career: Unlock Opportunities at Cybersecurity Conferences

Microsoft and NVIDIA Team Up for a Major Breakthrough

Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Senior Engineer (DAST SME)

November 8, 20250
Careers

Senior Cybersecurity & Compliance Consultant

November 8, 20250
Careers

Sr. Lead Cybersecurity Architect

November 8, 20250
Careers

Cybersecurity Subject Matter/Functional Expert III

November 8, 20250
Careers

Cybersecurity Senior Data Analyst, Bureau of Audit Services

November 8, 20250
Careers

IT CYBERSECURITY SPECIALIST (CUSTSPT)

November 8, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Senior Engineer (DAST SME)
  • Senior Cybersecurity & Compliance Consultant
  • Sr. Lead Cybersecurity Architect
  • Cybersecurity Subject Matter/Functional Expert III
  • Cybersecurity Senior Data Analyst, Bureau of Audit Services

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures