Developing and understanding threat models for quantum computers will be a crucial step in helping to design defenses for these emergent computing platforms. Threat models can clearly specify what should be protected and what capabilities possible attackers have. Once the…
Fingerprinting and tracking quantum computer hardware will become important when quantum computers are more widely available, and when companies move…
Quantum computer hardware companies actively publish development roadmaps with timelines for upcoming features. This newsletter article begins the new…
Quantum computer hardware cybersecurity research is a new and active research field. As we come to the end of 2022, there are already approximately 9…
Supply chain security is concerned with security threats and attacks that may occur, or may be initiated, during manufacturing, assembly, and delivery…
Most, if not all, of existing quantum computer deployments are for research or as demonstrations of the technologies being currently developed…
The White House and the National Science Foundation recently completed a two-day workshop on the intersection of cybersecurity and quantum computing…
Welcome to the Newsletter on Quantum Computer Hardware Cybersecurity This first newsletter article introduces the research area of quantum computer…
See all

Quantum Computer Hardware Cybersecurity