Techstrong TV - March 6, 2026

Techstrong TV (DevOps.com)
Techstrong TV (DevOps.com)Mar 7, 2026

Why It Matters

As quantum computers near practical capability, businesses face existential data‑security risks; adopting post‑quantum architectures like Crypt’s now protects critical assets, ensures compliance with imminent government mandates, and preserves competitive advantage.

Key Takeaways

  • Quantum security industry remains small but rapidly expanding
  • IP theft by China accelerates urgency for quantum‑proof encryption
  • Crypt replaces key distribution with simultaneous endpoint key generation
  • US government may ban non‑post‑quantum crypto after 2030
  • Enterprises must treat quantum transition as board‑level, not IT issue

Summary

TechStrong TV hosted Dennis Mandich, co‑founder and CTO of Crypt, to discuss the emerging quantum security landscape and the company’s inclusion in the Quantum Security 25 list. Mandich outlined his 20‑year intelligence background, the formation of the Quantum Economic Development Consortium, and the pressing threat of a so‑called “Q‑Day” when quantum computers could break today’s encryption.

He warned that the industry’s small talent pool and aggressive Chinese investment have compressed the timeline for quantum‑ready cryptography. Current public‑key infrastructure, built on 1970s algorithms, is vulnerable to “harvest‑now, decrypt‑later” attacks, and even NIST‑approved post‑quantum standards lack proven security. Mandich emphasized that the United States may bar companies without post‑quantum solutions from federal contracts after 2030.

Crypt’s core innovation, according to Mandich, is eliminating key distribution by generating keys simultaneously at both endpoints, ensuring keys never travel over the channel. “Even if you break the channel, you can’t decrypt the data,” he said, positioning the approach as a structural fix rather than a patch. He also cited the looming Chinese quantum race, noting their massive funding and graduate‑physicist pipeline.

The interview underscores that quantum‑ready transition is no longer a theoretical exercise; it is a board‑level imperative with regulatory, competitive, and national‑security stakes. Companies that adopt Crypt’s architecture now can mitigate future data‑harvest risks, satisfy upcoming government mandates, and avoid the costly retrofits that plagued the Y2K era.

Original Description

Post-Quantum Cryptography Becomes a Board-Level Priority: Qrypt CTO Denis Mandich warns that the threat of “Harvest Now, Decrypt Later” attacks and the potential to forge code-signing keys means organizations must begin migrating to post-quantum cryptography well before a projected 2029 deadline.
AI as an Advisor in the Mainframe Era: Anthony DiStauro of BMC Software explains how organizations can prepare legacy environments for AI by integrating institutional knowledge, real-time data and governance frameworks to ensure trustworthy adoption.
Taming the Technical Debt Snowball: Ron Browning, CEO of Dyna Software, warns that rapid development and “vibe coding” in platforms like ServiceNow can accelerate technical debt unless organizations enforce strict governance and prioritize configuration over customization.
Patterns of Success in Operationalizing AI: Microsoft executive Michelle Lancaster outlines how enterprises are successfully scaling AI initiatives through apps, agents and chat interfaces that deliver measurable business outcomes.
Modernizing Brownfield Data Centers Without Downtime: Nokia IT leader Ahmed Abutaleb explains how the company migrated legacy environments into a modern architecture built on Nokia SR Linux and Nokia Event‑Driven Automation while maintaining uninterrupted application services.
Security Beyond AI Models in 2026: A Tech Field Day podcast discussion highlights how identity security, browser protection and governance for non-human identities are becoming just as critical as securing AI systems themselves.
Inside the Bell Labs Reliability Model: Experts explain how operational discipline, automation and AI-driven monitoring—developed through Nokia Bell Labs—can push data center networks beyond five-nines availability.
AI in Overdrive: Chips, Networks and Robots: The Tech Field Day News Rundown analyzes major industry shifts including NVIDIA investing $4B in optical networking leaders Lumentum and Coherent Corp., Accenture acquiring Ookla, and Google integrating robotics firm Intrinsic to accelerate the next phase of AI infrastructure and automation.

Comments

Want to join the conversation?

Loading comments...