2834: Quantum Leaps in Cybersecurity With Quantinuum
Tech Talks DailyMarch 17, 2024
2834
33:4321.33 MB

2834: Quantum Leaps in Cybersecurity With Quantinuum

In today's episode of Tech Talks Daily, we pose an intriguing question: How is the burgeoning field of quantum computing poised to redefine the landscape of cybersecurity? To shed light on this complex topic, we welcome Duncan Jones, the Head of Cybersecurity at Quantinuum, the world's largest dedicated quantum computer provider. Our conversation navigates the fascinating intersection of quantum computing and cybersecurity, highlighting Duncan's insights on how quantum technology is beginning to assert its commercial value and impact within the tech sphere.

Duncan brings a wealth of experience, with over 15 years dedicated to cybersecurity and cryptography. He takes us on a journey through the evolution of Quantinuum, from its inception inspired by Stephen Hawking to becoming a $5 billion quantum computing titan. Quantinuum stands as a testament to the power of full-stack quantum computing, encompassing hardware, software, operating systems, and applications across various sectors including chemistry, machine learning, and notably, cybersecurity.

One of the pivotal topics we explore is the dual-edged sword of quantum computing in cybersecurity. Quantum technology harbors the potential to both compromise and enhance encryption methods. Duncan delves into this paradox, explaining how Quantinuum is pioneering efforts to harness quantum principles for fortifying cybersecurity, through innovations like quantum key distribution and quantum random number generation.

Our discussion extends to real-world applications and partnerships that underscore the tangible benefits of quantum cybersecurity. From Honeywell's integration of Quantinuum's Origin product in smart meters, to collaborations with giants like BMW and Airbus, Duncan provides compelling examples of quantum computing's practical utility in safeguarding digital infrastructure.

Moreover, Duncan shares his vision for the future, projecting significant advancements in quantum computing and cybersecurity within the next decade. This forecast not only emphasizes the ongoing development of quantum hardware but also the increasing integration of quantum-enhanced security technologies across industries.

As we navigate this conversation, we invite listeners to reflect on the transformative potential of quantum computing in redefining cybersecurity standards. How will businesses and individuals adapt to this new quantum era? Join us in exploring the implications of quantum technology's rapid advancement and its role in shaping a secure digital future.

We conclude by asking our audience: What are your thoughts on the integration of quantum computing into cybersecurity? How do you envision this convergence impacting your digital security measures? Share your insights and join the discussion on the future of quantum computing in cybersecurity.

[00:00:00] As we stand on the brink of a new era, quantum computing and cyber security are at the forefront

[00:00:08] of delivering commercial value and revolutionising numerous fields.

[00:00:13] And today's guest is Duncan Jones.

[00:00:15] He's from a company called Quentinium and he has over 15 years experience in cyber

[00:00:20] security cryptography and he's going to shed a little light today on how quantum computing

[00:00:26] can both post challenges to current encryption methods but also offer groundbreaking solutions

[00:00:32] for enhanced security.

[00:00:35] From quantum key distribution to quantum random number generation, I want to explore the

[00:00:41] positive applications of quantum computing in cyber security backed up by real world

[00:00:46] examples and partnership giants but in a language that we can all understand because

[00:00:51] I know when a few of you hear quantum computing and cryptography, you suddenly hear dock

[00:00:56] brown from back to the future shouting, great scut!

[00:01:00] But don't worry we're not going to leave anybody behind today.

[00:01:02] We're going to put it all in our language everyone can understand and learn more about

[00:01:05] how Quentinium's focus is on advancing hardware but also achieving computation milestones over

[00:01:13] the next decade.

[00:01:14] And this episode promises to be a glimpse into the future of technology but also show

[00:01:18] you that a lot of this stuff we're going to be talking about is not science fiction,

[00:01:22] it's available right here right now.

[00:01:25] But before we get today's guest on it's time for a quick shout out to the sponsors

[00:01:29] of tech talks daily and in today's digital age where data breaches are all too common, securing

[00:01:35] sensitive information has never been more critical right?

[00:01:38] Well enter kite works, a pinnacle of managed file transfer security or MFT security.

[00:01:45] So with its FedRAMP moderate authorisation, a prestigious certification that they've held

[00:01:50] since 2017 by the Department of Defence, kite works stand as a bastion of security and

[00:01:56] a sea of uncertainty.

[00:01:58] So stepping to the future of secure file transfer with kite works by visiting kiteworks.com

[00:02:04] today to see why it's held as the most secure MFT on the market so once again kiteworks.com

[00:02:11] And now let's get today's guest on!

[00:02:13] So buckle up and hold on tight as I beam your ears all the way to Cambridge here in the

[00:02:18] UK where Duncan is waiting to take us into the quantum realm and discover the potential

[00:02:24] of quantum cyber security and much more.

[00:02:28] So a massive warm welcome to the show can you tell everyone listening a little about

[00:02:32] who you are and what you do?

[00:02:34] Hi there thank you for having me Neil my name is Duncan Jones and I oversee all of

[00:02:41] the cyber security activities at Continuum which is mostly focused around how do we use

[00:02:50] quantum as a force for good in cyber security.

[00:02:54] I'm actually new to the world of quantum in the last three or four years my background

[00:02:59] is in regular cyber security, I guess you would call it.

[00:03:04] So I've spent my career 15 or 16 years working for generally global cyber security companies

[00:03:12] working on cryptographic solutions that sort of thing, working with companies like Talis

[00:03:18] or in the IoT space with ARM and actually briefly some payments with world pay.

[00:03:25] So a bit of a varied background.

[00:03:28] Well incredible exciting space to be in at the moment and quantumium is known as the

[00:03:33] largest full stack quantum computing company and you're seeing now and co-founder shared

[00:03:38] the inspirational story or origin story behind the company and being inspired by Stephen

[00:03:44] Hawking on this show but anyone that's not heard that conversation.

[00:03:48] Can you just remind the listeners with a little more about essentially the kind of problems

[00:03:52] and business value that you offer at on tenement with your technology?

[00:03:58] Yeah sure so there's a very nice photo of Stephen in our boardroom with Ilius and the

[00:04:08] friend of anyone who missed the backstory, the extremely brief version of it is that Ilius

[00:04:13] and Stephen Hawking knew them knew each other very well and there was a moment back in the early

[00:04:19] 2010 sort of time frame where Stephen basically gave Ilius to Naldon so this is a real thing.

[00:04:26] This is going to go somewhere and Ilius promptly went off and started a company and

[00:04:34] fast forward ten years and it's now the largest quantum computing company in the world.

[00:04:40] We just had a significant fundraise at the start of the year that values us at around five

[00:04:46] billion dollars or something ludicrously large so it's a really exciting place to be at the moment.

[00:04:52] We describe ourselves as a full stack quantum computing company and what that means is

[00:04:59] we have teams working on sort of every layer in every area where quantum computing is going to

[00:05:07] have some advantage so that means from the sort of hardware layer and the physics layer we have

[00:05:13] people developing you know world class quantum computers themselves. So for example in the United

[00:05:20] States we have a pair of machines based around technology called trapped ions which is just one

[00:05:28] of the approaches that you can take when you're building quantum computers. It's a very promising

[00:05:34] direction to travel in and what is resulted in is a pair of machines that are demonstrating some

[00:05:40] really world class performance at the moment. Above that you're much like with a traditional

[00:05:46] computer you've got things like operating systems and software applications and you have similar

[00:05:55] similar items in the quantum world as well. So we've got groups focused on the emergence of

[00:06:01] operating systems and sort of very advanced compilers for quantum circuits and then on top

[00:06:08] of that is where the rubber meets the road and that's the application use cases so we've got

[00:06:14] groups focused on quantum chemistry and quantum machine learning and language processing and obviously

[00:06:22] we'll come back to cyber which is the art I lead but we're addressing you know real world challenges

[00:06:28] to some of our projects at the moment focus on things like seismic imaging so there's things you can

[00:06:33] do in with with quantum technology that can potentially reduce the amount of memory you need or

[00:06:39] make it faster to perform these calculations. We're doing things in you know very exotic sounding

[00:06:46] stuff like computational fluid dynamics which is all about you know how do you understand how air

[00:06:52] and liquids move past things so that's really helpful for simulating some of our customers

[00:06:58] and then another example maybe would be in the finance sector so you know Monte Carlo simulation

[00:07:04] is a very important topic for a lot of organizations that need to sort of do things like portfolio

[00:07:12] analysis and quantum promises speed ups there that might allow you know real shifts in time

[00:07:22] towards things like real-time analysis rather than you know having to take overnight position

[00:07:27] which is sort of how things are done today. So there's this whole kind of spectrum of

[00:07:31] use cases there are different degrees of maturity and in each of those areas I think we've

[00:07:39] managed to assemble a critical mass of world exports who are really pushing that forward.

[00:07:44] Fantastic and I will add a link to that conversation that we had with your founder I think it was

[00:07:49] episode 1,949 just under two years ago I'll add a link to the show notes so people can learn more

[00:07:55] about that inspirational backstory and more recently I was reading that quantum computing could

[00:08:01] generate novel answers to some of the biggest challenges that we face in a variety of industries

[00:08:07] including cybersecurity and just looking at the number of breaches in January and February this year

[00:08:13] already it is a huge topic so what is quantum cybersecurity? So that's incredibly interesting

[00:08:21] yes it's quite a broad field actually and you're right did we look at the kind of landscape

[00:08:26] we live in cyber threats and cyber risks are sadly always moving in the wrong direction so

[00:08:33] you people are always looking out for opportunities to take a step forward on the defensive side as well

[00:08:41] and so when you consider quantum cybersecurity there's two sides to that

[00:08:46] field so one side is focused on actually viewing quantum as a negative thing so

[00:08:57] we're incredibly excited about what quantum computers can do in a number of fields that's

[00:09:02] going to really revolutionize humanity's progress really but the problem is quantum computers can solve

[00:09:11] problems that we can't solve today and actually we rely upon that to keep some of our

[00:09:17] cybersecurity systems safe and secure so as these quantum computers become more powerful there

[00:09:23] is the potential for them to be misused to break into cryptographic systems and there is a particular

[00:09:31] quantum algorithm that was identified more than 20 years ago called Shores algorithm

[00:09:41] which would allow us to effectively break the mathematics used in a lot of cryptographic systems

[00:09:47] today so one half of quantum cybersecurity is focused on tackling that problem

[00:09:53] as a huge piece of work to migrate organizations and their IT infrastructure

[00:10:02] to start using different types of cryptography and these new types that are being developed

[00:10:08] are hoped and believed to be resistant to being broken on a quantum computer as well as on a

[00:10:15] on a classical computer so that that size very interesting it's getting a lot of press at the

[00:10:20] moment yeah we've seen the US government in particular taking a lead there and really

[00:10:26] driving and demanding organizations to take that threat seriously and to begin to

[00:10:32] you know respond to that but actually that's the side that I think is interesting but it's not

[00:10:38] quite as exciting as the idea of using quantum as a positive force in cybersecurity

[00:10:47] and the reason why we can do that is because you know if you sort of explore at any depth

[00:10:56] quantum computing and quantum physics it becomes clear very quickly that it's it's very different

[00:11:04] to what we're familiar with here with the physics that most of us just about caught wind of at school

[00:11:09] you know we will be on the kind of Newtonian kind of apples for you have to tree stuff

[00:11:15] into the weird and wacky world of quantum and some of the behaviors that you can witness and you can

[00:11:21] measure at a quantum level are really really interesting for cybersecurity and they provide

[00:11:28] opportunities for us to take parts of our cybersecurity infrastructure and make them stronger so

[00:11:36] actually reduce the likelihood that somebody can break this particular piece so for example

[00:11:43] one area that my team focuses on here is in a generation of random data so randomness is

[00:11:55] a really important topic in cryptography in general you can't really encrypt data securely or

[00:12:04] or do any kind of cryptography without a strong supplier randomness and that's just one example

[00:12:11] of how quantum behavior and quantum systems can help us achieve stronger cybersecurity because

[00:12:19] the guarantees that you get from quantum physics are far stronger than you can get from

[00:12:26] classical physics so we're able to generate stronger encryption keys for example using a

[00:12:31] quantum computer then we can with a with a classical computer and you provided one fantastic example

[00:12:38] how they you can use cybersecurity is a positive we're around quantum computing but any business

[00:12:44] leaves at all anybody in the cybersecurity industry listening wondering how this might work

[00:12:48] in their world are there any other use cases that you could share that would just help them

[00:12:52] understand how it would work in their world to yeah I can give you a couple of examples

[00:12:58] because yeah on the one hand this stuff can sound pretty like you know science fiction and

[00:13:04] unattainable and in fact the the opposite is true yeah some some of this technology is

[00:13:10] in production today and then some other solutions are coming down the path so if I if I just

[00:13:17] expand a bit on what I started with which is this topic of of randomness generation so this is

[00:13:23] something that yeah sounds very far fetched we're going to take into quantum physics and generate

[00:13:29] random data but actually it's it's it's entirely possible today and we're working with customers who

[00:13:36] have embedded this technology into their you know IT infrastructure and in many cases we actually

[00:13:42] work with cyber security vendors who add that into their products and the reason why we're able

[00:13:48] to do this today is because we have quantum computers they exist and although they are not yet at a

[00:13:56] stage where they can solve you know some of the complex problems we want to tackle in in you

[00:14:03] know chemistry or material modeling all these sorts of exotic things but for the task of

[00:14:09] generating randomness that we can prove is actually really random and we already have all the

[00:14:16] capacity that we need they're ready powerful enough for that use case so that that is something

[00:14:21] that is actually deployed today we have a product called entomarjan it was designed specifically

[00:14:28] for this and so we can embed our technology into you know even the laptop you're using right now

[00:14:35] to speak to me we we could put our software in into your laptop it contains some data that we've

[00:14:43] generated on a real quantum computer and then it result is that your your laptop generates

[00:14:49] stronger encryption keys and it's and it's you know it reduces the risk of sophisticated attacks

[00:14:56] so that's something that's available in here and now if we look slightly further down the line

[00:15:02] there's another technology that's there's getting a lot of interest which is called quantum key

[00:15:07] distribution so this tackles a sort of a related problem so okay you know maybe maybe

[00:15:15] near with your kind of you know super advanced quantum origin technology inside your laptop you're

[00:15:21] now generating the best keys in the world but often you have to share a key with somebody you

[00:15:27] know if you want to actually communicate securely with somebody they have to have the same key as you

[00:15:31] it's a bit like you know locking a box and sending it to somebody they can't open the box

[00:15:36] unless they have the key so there are some traditional approaches to solving this using you know

[00:15:44] typical classical technologies but quantum provides some more interesting ingredients here that

[00:15:50] might make the solution even stronger so we can actually exchange quantum information with each other

[00:15:57] so qubits rather than digital bits and one of the properties of quantum physics is you can

[00:16:05] prove that nobody else has basically listened into your conversation so if you and I successfully

[00:16:13] share a key using this this quantum key distribution we can actually prove to ourselves with the laws

[00:16:19] of physics that nobody else knows that key it's just me and you that's just a really interesting

[00:16:25] property and it could promise stronger communications going forward that one though as a technology

[00:16:32] it's a little bit less mature and so we're seeing lots of examples of people deploying this at small

[00:16:38] scales but for it to become production ready and and deployed at scale like the like the first

[00:16:45] use case a little bit more time is passed we have some technical challenges to overcome

[00:16:51] but I don't doubt that we will get there so I think quantum key distribution will be an important part

[00:16:56] of communication security in the years ahead incredibly cool and I'm not sure how much you're going

[00:17:04] to be able to share with me but I'm going to try anyway because you probably lock down as to

[00:17:08] what you can share but are you able to discuss any collaborations or partnerships that you are

[00:17:14] exploring right now it any or if you can't any teases or that you couldn't leave us with yeah

[00:17:19] there are a few we can mention and one of the challenges I think you're alluding to in the

[00:17:24] cyber security spaces that when you work with people sometimes they are proud to talk about it

[00:17:28] and sometimes they want to keep it secret because everything they do is about secrecy but

[00:17:33] yeah there's a few examples that might help people kind of make this less abstract so

[00:17:39] for example one use case we have is we're working with Honeywell which you know we're both from

[00:17:46] the UK and for some reason in the UK when you say Honeywell people just think of thermostats

[00:17:51] and radiators yeah but if it globally Honeywell is a huge organization that they're

[00:17:57] everything from aviation systems to critical infrastructure so in that arena critical infrastructure

[00:18:05] we have a use case with Honeywell so they've deployed this quantum origin technology

[00:18:12] into their smart meter infrastructure and so if you sort of think about where the greatest risks

[00:18:21] lie for nation state attacks or we've kind of seen with the sad situation in Ukraine that

[00:18:29] cyber warfare is a real part of modern warfare and critical infrastructure gets its name because

[00:18:39] clearly if you can interfere with the for example the electricity grid you can really cause a lot

[00:18:44] of problems so it's an area where security is critical and so Honeywell in this case has deployed

[00:18:50] quantum origin into their infrastructure to strengthen the cryptography strength and the keys

[00:18:56] that are being generated there on a sort of related note we want another one about partners is

[00:19:02] an organization called talus they are a well they're global organization headquartered in

[00:19:08] in France and again they do everything from you know battleships down to you know IOT devices but

[00:19:17] they have a cyber security division and they're one of the leaders or enterprise cyber security

[00:19:25] and so last month we actually launched an initiative with talus which we're calling the the PQC

[00:19:32] starter kits so here PQC referring to post quantum cryptography which is the name given to these

[00:19:41] new algorithms that will resist quantum attack and so actually we're we're sort of

[00:19:47] merging together there the two sides of the industry that I was talking about earlier so you know

[00:19:51] that's a that's a technical offering that allows organizations to start exploring what it means

[00:19:58] to become ready to face the quantum threat and at the same time embracing quantum as part of

[00:20:05] the solution so you kind of get the best of both worlds there and maybe one more example because

[00:20:11] I don't want to 20 of them but just to give you a sense of the range of things that we we encounter

[00:20:19] we had a pretty cool project recently with an art or in Japan called Eglis and the problem being

[00:20:27] solved there is you know everybody's embracing artificial intelligence and machine learning and

[00:20:34] you know the the opportunities there are vast but there is always this cyber security headache like

[00:20:41] you can I can I trust that I can send my data to this organization over here so they could do

[00:20:49] some kind of cool machine learning stuff on it and send it back to me is that okay do I trust

[00:20:54] them with my data so Eglis has developed a technology that allows allows that third party to

[00:21:03] operate on your data while it's still encrypted so they don't get to see what your data is but

[00:21:08] you get to benefit from sort of their processing of it I guess and so again we integrated our

[00:21:15] quantum origin software into that and it's part of a whole sort of quantum resistant approach

[00:21:21] they've taken to security so that's you know some of the things we're doing in the cyber space

[00:21:25] and it does seem to be a real I guess uptick of interest at the moment obviously continue as a

[00:21:32] whole does many things beyond cyber security so yeah there's there's announcements on a regular

[00:21:38] basis about our work with partners so we work with for example leading high performance computing

[00:21:45] centers and AI centers so places like Reekim in Japan who are actually who've actually purchased

[00:21:53] one of our quantum computers for their own research or in the United States we work with Oak Ridge

[00:21:59] National Laboratory for example but we see a lot of interest in the enterprise space as well

[00:22:06] so we're working with people like BMW, Airbus, Equinole, JPMC, HSBC all the acronyms

[00:22:14] yeah we've got a lot of collaborations in flight as these organizations explore quantum generally

[00:22:20] and how it can shape their businesses and as you said earlier in your answer there about Honeywell

[00:22:26] over in the UK we're automatically assuming he ain't getting an radiate isn't I think it'd be about

[00:22:31] three or four years ago I had a guy from Honeywell quantum solutions on here I think his name was

[00:22:36] Brian Nayan who is just something like that and I think he's since gone on to to

[00:22:41] quantum him himself do you know maybe have you bumped into a limiter?

[00:22:45] yeah yeah yeah yeah yeah and I don't know Brian yeah so a couple of years ago the team at Honeywell

[00:22:53] that had been working on quantum computers actually merged with the company that Ilius who we

[00:22:59] were talking about at the start founded and actually that is where continuum came from so we

[00:23:05] we were an organization born from two of the leading companies in quantum so one were the leader

[00:23:11] in quantum software the other was a leader in quantum hardware so yeah Brian yeah stayed on board

[00:23:18] and he's still with the company today oh wow fantastic small world I know that's amazing

[00:23:25] I'm curious I mean you've mentioned some pretty big names here what kind of feedbacks

[00:23:30] well what kind of feedback did you get from them did you did it blow their mind initially or when

[00:23:35] they already well versed to know well it's capability is where what kind of feedback did you get

[00:23:39] from them I mean there's been a lot of interest in positive feedback about our quantum computers

[00:23:46] themselves yeah one of the things we hear regularly is that because of the very high

[00:23:52] quality of those machines you know researchers in these large organizations can it can achieve

[00:23:58] things and perform experiments on our machines that they haven't been able to do before so there's a

[00:24:04] lot of positivity there around what is possible and I think the other thing I hear as well and

[00:24:14] I think the sort of the feedback we get from customers and the market as a whole is that we've

[00:24:20] really tried to lead on scientific integrity and you know minimizing the hype that so often

[00:24:31] surrounds you know quantum computing as a whole and also quantum cybersecurity so we're very careful

[00:24:41] before you know before we announce something it is it is scientifically backed and it is credible

[00:24:47] and I think that has developed a reputation for our organization in the industry

[00:24:52] um on the side beside I think we we have a lot of conversations where

[00:24:59] you know people are not clear what the future looks like and so you know some of our conversations

[00:25:04] are really around explaining this world and helping people understand what they need to do

[00:25:09] the positive feedback we get on the cyber side is that people are surprised how easy it is to

[00:25:15] integrate and use our technology you know it sounds horrifically complicated uh you know

[00:25:21] that it's there's a quantum computer involved somewhere in this solution and when they discover

[00:25:27] them that actually it's a it's a piece of software that they can put onto a laptop or they can plug

[00:25:32] it into a Linux system or put it into their IoT device and it just works out the box that that

[00:25:37] tends to tends to maze people actually incredible and a salon right in the heart of this

[00:25:44] film style to speak here what excites you about the potential of quantum computing and makes

[00:25:51] you almost maybe want to jump out of bed in the morning what excites you about this?

[00:25:55] Well I'm genuinely excited every day because you know because my background hasn't been in

[00:25:59] quantum I never thought I would uh you know deserve a place in this industry so every day I'm

[00:26:05] pinching myself that this science is evolving around me and somehow I get to be a very small part

[00:26:12] of it and it's really exciting on the on the cyber side and I'm excited by the grounds

[00:26:18] well of interest in the in the technologies you know I think three or four years ago this

[00:26:24] this we sort of concepts were floating around they were very nascent and I think people saw them

[00:26:28] as science projects and month after month now though I see the interest in this topic growing

[00:26:36] you know I see LinkedIn exploding with commentary on most quantum photography and quantum technology

[00:26:44] and as I speak to organizations they're more and more familiar with this stuff that you know

[00:26:50] they're asking intelligent questions it's clear they've done their homework and now they're

[00:26:54] really looking to do something about it so on the side I think it's just about that rate of

[00:26:59] progress that I think is very exciting and and then we look further ahead I think you know the

[00:27:06] quantum networks and the ability to send quantum information around I think that's going

[00:27:10] to be game-changing as that begins to mature on the computer side again we're at this really

[00:27:17] we're at a tipping point now where we're going to start seeing

[00:27:22] the quantum computers can do things that can't be done on a you know even the biggest

[00:27:27] classical super computers and that you know we're at that moment now and so in the months and

[00:27:33] years ahead we're going to really start to see these milestones being hit and you know as things

[00:27:39] like error correction which is a very big topic in quantum computers you know how would you get

[00:27:44] these computers to keep doing their calculations and not be as set by you know ever growing

[00:27:50] accumulation of errors and you know as strides are taken forward in that direction as the computers

[00:27:57] get bigger we're just going to see the series of milestones being knocked down over the next year

[00:28:02] 18 months and so I'm really excited and not so involved in that myself I'm going to have a

[00:28:07] you know front row passion to see you know these announcements coming out

[00:28:11] yeah she's heard it isn't incredibly exciting time and just before you hopped on to speak with

[00:28:16] me today in this podcast I was reading about how m it and i b m are finding clever AI ways around

[00:28:23] brute force math which just blew my mind reading that article and apologies that we have got

[00:28:28] to nearly 30 minutes and I've mentioned the AI word but I've got no ask what's next for

[00:28:33] quantumium and what is your big focus anything you can share there well I think it's um it's really

[00:28:38] around hitting these milestones that I'm talking about yeah so you know we have teams working on

[00:28:45] improving the hardware we've got teams you know making real advances in the error correction stuff

[00:28:50] that I was talking about and you know our hardware roadmap is designed around this idea of

[00:28:59] continuously upgrading our machines so looking ahead over the next 12 months we're going to be seeing

[00:29:05] those milestones being here we're going to see problems being solved for the first time that you

[00:29:10] just can't you know simulate on a classical computer because that's the crazy thing up until you know

[00:29:16] about now whatever you did a quantum computer you could you could effectively run it on a very

[00:29:22] powerful classical computer and simulate what the result should be we're about to leave that behind

[00:29:27] us now go into the unknown world where you know the quantum computers have gone beyond what could be

[00:29:32] done classically in some areas so I think our focus really is on our hardware road maps and

[00:29:39] delivering upon our promises there and the cyber sector which is obviously my my little domain

[00:29:45] and it's really about just continuing the production run out of this technology building more

[00:29:50] integrations into systems and just really trying to keep up with the demand and interest in this

[00:29:56] in this technology well I think that's a very powerful moment to end on but before I do let you go

[00:30:01] a big thank you for showing your insights today but I'm going to ask you to leave one more final

[00:30:06] gift to everyone listening and that is a song that means something to you that we can add to

[00:30:11] our Spotify playlist or a book to the Amazon wishlist but all I'm going to ask is what would you

[00:30:16] like to leave everyone listening with them why I think I think I'd probably get on the book route

[00:30:21] because I'm a bit a big reader and if I think back at the book that probably had the biggest impact

[00:30:27] on me when I read it it's a book called The Four Hour Work Week was written by a sort of a

[00:30:34] self-experiment to call the Tim Ferris and it's it's I've never achieved a four hour work

[00:30:41] we just to be clear but I read it at the start of my career and I think it really shaped

[00:30:46] how I approach work and how I try and stay on top of a lot of things going on and

[00:30:52] certainly in this job over the last three years I've needed you know those tricks more than ever so

[00:30:57] I think that's uh I don't know how you know whether it stands the test of time but when I read it

[00:31:01] back in 2007 it was really really influenced me so I think that would be my answer yeah it's a

[00:31:08] cracking book I will add that straight to the Amazon wishlist and for anyone listening just want

[00:31:13] to find out more information about you but quantum technology about the work that you're doing

[00:31:17] well do you like to point everyone listening? Well two places I think um you know we publish

[00:31:22] everything we're doing as an organization at ontinium.com so that would be one place to look

[00:31:29] if you are particularly interested in in the side security side of things you can find me on LinkedIn

[00:31:34] and I post pretty regularly about the industry and what's going on and so that would be another

[00:31:39] place to to look at testing well I'll add those links so people can fire you nicely so

[00:31:45] as we said at the very outset of this podcast quantum it is the largest full stack quantum

[00:31:50] computing company I just saying those words at the beginning of the podcast might have

[00:31:54] intimidated a few people listening but I just love how we've been able to demystify this technology

[00:31:59] talk about the real world value business problems it will solve etc and the problems around

[00:32:03] cyber security absolutely incredible what you're doing here but just thank you for putting in

[00:32:08] language everyone can understand thanks for joining me today thanks for having me.

[00:32:13] For me Duncan's expertise has illuminated the dual nature of quantum computing and cyber security

[00:32:18] anyhow I've had both the challenges and the incredible opportunity is that it presents for

[00:32:23] strengthening our digital defenses and with real world applications already underway and a vision

[00:32:29] for the next decade that promises even more groundbreaking advancements it's clear

[00:32:34] the quantum era is already here and it's unfolding before our very eyes so as we continue to

[00:32:40] navigate these uncharted digital waters one thing remains certain diffusion of quantum computing

[00:32:46] and cyber security will be a key driver of innovation offering new ways to protect

[00:32:52] and enhance our digital world so big thank you to Duncan for sharing his profound knowledge

[00:32:57] and the vision for quantumium with us today but over to you the future is quantum and the

[00:33:03] possibilities are fast as the universe itself but what are your thoughts on the potential of quantum

[00:33:08] computing especially in cyber security but after any other areas that you're in the heart

[00:33:14] I'd love to hear from you too so please email me now tech blog right to outlook.com twitter

[00:33:20] linkedin instagram just at nilc use but that's it for today so until next time stay curious stay

[00:33:26] informed keep looking towards the future see you tomorrow

[00:33:38] you