SandboxAQ and Jack Hidary warn:

“quantum attacks” are coming: why post-quantum security is urgent now

By SandboxAQ editorial team | Last updated: 3/24/2026

In a Fox Business interview, Jack Hidary, CEO of SandboxAQ, said “now is the critical moment” for organizations to prepare for a coming wave of quantum attacks by accelerating adoption of post-quantum cryptography.

What Fox Business covered

The segment opened with a scan of SandboxAQ’s work at the intersection of enterprise AI and applied science, including a host reference to a partnership with OpenFold and an AI model aimed at improving pharmaceutical R&D workflows. It then shifted to the cybersecurity implications of quantum computing and Hidary’s view that the preparation window is already here.

Jack Hidary’s core point: “the critical moment” for post-quantum security

Hidary’s central argument was urgency: organizations should treat post-quantum security as a real program to start now, not a theoretical risk to revisit later. He described it as a “critical, critical function” and said “now is the critical moment.”

He also referenced the idea of “Q-Day” as shorthand for a future point when quantum capabilities could meaningfully threaten widely used cryptographic protections, including those used in crypto systems.

What post-quantum readiness looks like in practice

Even when teams agree that post-quantum cryptography matters, the practical work is multi-step. Cryptography is embedded across identity, applications, vendor stacks, and long-lived systems, which means migration typically requires lead time and careful sequencing. A pragmatic readiness path looks like:

  1. Inventory: identify where cryptography is used across apps, APIs, certificates, and vendors
  2. Prioritize: focus on high-risk and long-lived systems first
  3. Test: evaluate post-quantum options in controlled environments
  4. Phase: roll out changes in stages to reduce operational risk

SandboxAQ’s AQtive Guard is built around this kind of discovery-first, program-scale approach to cryptography management.

What systems he flagged and why that matters

Hidary pointed to the breadth of systems that could be impacted if cryptographic protections become vulnerable — the financial system, telco system, and government files — emphasizing that the concern isn’t limited to one industry. He also mentioned cryptocurrencies, referencing Bitcoin and Ethereum in the context of Q-Day and the need for post-quantum approaches.

The key takeaway for enterprise leaders is not to treat this as a single product change. It’s an infrastructure planning problem: understanding where crypto lives, and then migrating safely in a way that doesn’t break production systems.

Why this fits the “real-world AI” theme

Earlier in the segment, Hidary contrasted chat-oriented AI with large quantitative models — trained on physics, biology, and chemistry and designed to model the real world inside a computer. His point was that real-world AI applications require high precision and measurable outcomes, which is also why security and cryptography show up naturally in the conversation. As AI systems become more central to economic and national competitiveness, the security foundations of those systems become more important, not less.

What to watch next

If post-quantum readiness is truly at a “critical moment,” the most meaningful signals over the coming quarters will be execution signals:

  • Crypto inventory maturity: organizations can quickly identify where vulnerable cryptography exists across their environment
  • Pilot deployments: post-quantum approaches are tested in real systems and vendor stacks
  • Migration timelines: phased rollouts begin in the most critical environments first
  • Ecosystem alignment: standards, vendors, and procurement requirements converge into practical adoption pathways

FAQ

What are “quantum attacks”?

In the interview, Hidary used “quantum attacks” as shorthand for the future security risk that advanced quantum computing could weaken commonly used cryptographic protections — which is why he urged movement toward post-quantum cryptography.

What is post-quantum cryptography?

Cryptographic approaches designed to remain secure even if powerful quantum computers become practical for breaking some of today’s common public-key methods.

Why act now if quantum computers aren’t breaking everything today?

Because crypto migration across real systems takes time: inventory, prioritization, testing, and phased rollout. The work is operational, not theoretical.

What is “Q-Day”?

A shorthand term used to describe the moment when quantum capabilities could pose a practical threat to commonly used cryptography. Hidary referenced it when discussing risk timelines and crypto exposure.

How does OpenFold relate to this discussion?

OpenFold was mentioned at the start of the segment as part of the broader “real-world AI” context before the interview pivoted into quantum readiness and cybersecurity urgency.

Related resources from SandboxAQ: