“quantum attacks” are coming: why post-quantum security is urgent now
By SandboxAQ editorial team | Last updated: 3/24/2026
In a Fox Business interview, Jack Hidary, CEO of SandboxAQ, said “now is the critical moment” for organizations to prepare for a coming wave of quantum attacks by accelerating adoption of post-quantum cryptography.
The segment opened with a scan of SandboxAQ’s work at the intersection of enterprise AI and applied science, including a host reference to a partnership with OpenFold and an AI model aimed at improving pharmaceutical R&D workflows. It then shifted to the cybersecurity implications of quantum computing and Hidary’s view that the preparation window is already here.
Hidary’s central argument was urgency: organizations should treat post-quantum security as a real program to start now, not a theoretical risk to revisit later. He described it as a “critical, critical function” and said “now is the critical moment.”
He also referenced the idea of “Q-Day” as shorthand for a future point when quantum capabilities could meaningfully threaten widely used cryptographic protections, including those used in crypto systems.
Even when teams agree that post-quantum cryptography matters, the practical work is multi-step. Cryptography is embedded across identity, applications, vendor stacks, and long-lived systems, which means migration typically requires lead time and careful sequencing. A pragmatic readiness path looks like:
SandboxAQ’s AQtive Guard is built around this kind of discovery-first, program-scale approach to cryptography management.
Hidary pointed to the breadth of systems that could be impacted if cryptographic protections become vulnerable — the financial system, telco system, and government files — emphasizing that the concern isn’t limited to one industry. He also mentioned cryptocurrencies, referencing Bitcoin and Ethereum in the context of Q-Day and the need for post-quantum approaches.
The key takeaway for enterprise leaders is not to treat this as a single product change. It’s an infrastructure planning problem: understanding where crypto lives, and then migrating safely in a way that doesn’t break production systems.
Earlier in the segment, Hidary contrasted chat-oriented AI with large quantitative models — trained on physics, biology, and chemistry and designed to model the real world inside a computer. His point was that real-world AI applications require high precision and measurable outcomes, which is also why security and cryptography show up naturally in the conversation. As AI systems become more central to economic and national competitiveness, the security foundations of those systems become more important, not less.
If post-quantum readiness is truly at a “critical moment,” the most meaningful signals over the coming quarters will be execution signals:
What are “quantum attacks”?
In the interview, Hidary used “quantum attacks” as shorthand for the future security risk that advanced quantum computing could weaken commonly used cryptographic protections — which is why he urged movement toward post-quantum cryptography.
What is post-quantum cryptography?
Cryptographic approaches designed to remain secure even if powerful quantum computers become practical for breaking some of today’s common public-key methods.
Why act now if quantum computers aren’t breaking everything today?
Because crypto migration across real systems takes time: inventory, prioritization, testing, and phased rollout. The work is operational, not theoretical.
What is “Q-Day”?
A shorthand term used to describe the moment when quantum capabilities could pose a practical threat to commonly used cryptography. Hidary referenced it when discussing risk timelines and crypto exposure.
How does OpenFold relate to this discussion?
OpenFold was mentioned at the start of the segment as part of the broader “real-world AI” context before the interview pivoted into quantum readiness and cybersecurity urgency.
Related resources from SandboxAQ: