Techstrong TV - March 24, 2026

Techstrong TV (DevOps.com)
Techstrong TV (DevOps.com)Mar 24, 2026

Why It Matters

Quantum‑grade attacks could render current encryption obsolete, while expanding cloud exposure demands agile, automated security architectures to protect enterprise data and AI workloads.

Key Takeaways

  • Quantum "harvest now, decrypt later" attacks rising rapidly
  • QRNG and crypto‑agility essential for future‑proof security
  • Cloud networks now largest unprotected attack surface
  • AI‑driven infrastructure requires machine‑speed security controls
  • VMware NSX enables automated, policy‑driven multi‑tenant networking

Pulse Analysis

Quantum computing is moving from theoretical research to operational capability, and cyber‑criminals are already exploiting this shift. The "harvest now, decrypt later" model involves collecting encrypted traffic today and storing it for future decryption once quantum processors can break current algorithms. Organizations must therefore transition to post‑quantum cryptography, integrate quantum‑grade random number generators, and design crypto‑agile systems that can swap algorithms without disruption. Scalable key‑management platforms become the backbone of this strategy, ensuring that keys are generated, rotated, and retired in a quantum‑resilient manner.

At the same time, the proliferation of AI‑driven applications on low‑code platforms like Microsoft Power Platform introduces new governance challenges. Secure development lifecycles now require managed environments, adaptive risk models, and continuous compliance checks to prevent malicious agentic behavior. By embedding security controls directly into the app‑building process, enterprises can enforce policy consistency, monitor data flows, and automate remediation, thereby reducing the attack surface that AI components might otherwise expose.

Cloud networking has evolved into the primary battleground for cyber threats, eclipsing traditional perimeter defenses. As workloads migrate to multi‑tenant VPCs and AI‑optimized infrastructure, organizations need automated, policy‑driven networking solutions. VMware Cloud Foundation’s NSX delivers micro‑segmentation, zero‑trust controls, and dynamic policy enforcement across both VXLAN and native cloud fabrics. This approach not only streamlines compliance but also enables rapid scaling of secure network segments, essential for protecting data in an era where cloud attack surfaces expand faster than ever.

Original Description

Quantum Threats Are No Longer Distant
“Harvest now, decrypt later” attacks are accelerating as adversaries stockpile encrypted data
Urgent need for quantum-ready security: QRNG, crypto-agility, and scalable key management
Featuring Vikram Sharma, CEO of QuintessenceLabs
AI Security & Governance at Scale
How to securely build and deploy agentic apps using Microsoft Power Platform
Governance strategies: managed environments, adaptive risk models, lifecycle controls
Insights from Ryan Jones (Microsoft) and Fernando Montenegro
Cloud Network Security Is the New Battleground
কেন traditional perimeter security is no longer enough
Cloud networks emerging as the largest unprotected attack surface
Willie Tejada (Aviatrix) on securing AI-driven, machine-speed infrastructure
Security Boulevard Spotlight
Why VCF Networking (NSX) is critical—even in VXLAN-enabled environments
Enabling automated, policy-driven networking and secure multi-tenant VPCs
Dimitri Desmidt on modern network virtualization in VMware Cloud Foundation

Comments

Want to join the conversation?

Loading comments...