top of page

Search


Nine Minutes. That's Your New Attack Window.
Google Quantum AI just published the most significant quantum threat assessment the blockchain space has ever seen (https://quantumai.google/static/site-assets/downloads/cryptocurrency-whitepaper.pdf). Here's why you should take it seriously — and what to do about it. JOEL VAN DYK APRIL 2026 ~7 MIN READ Let me be direct. I have spent close to three decades as a security architect at some of the world's largest financial institutions — JPMorgan, DTCC, LSEG, State Street. My fo
Joel Van Dyk
Apr 28
Understanding Quantum Cryptography: What You Need to Know
The Shift in Quantum Risk Perception This Isn’t a Physics Breakthrough Coming from the physics world, what strikes me is the headline number—~10,000 qubits to break RSA or ECC—is being treated as a breakthrough in quantum capability. It isn’t. The underlying physics has still remained the same. No breakthroughs there. What this paper actually represents is a compression of assumptions. The result depends on a stack of conditions aligning: Scalable quantum LDPC error correctio
Joel Van Dyk
Apr 7


Q-Day Is Moving Left: Why 2035 May Be a Dangerous Assumption
We are no longer debating if quantum advantage is possible—we are now observing the first hints of it and where it begins to matter.
Why This Pulls Q-Day Forward
There’s a critical misunderstanding in how many organizations think about Q-Day.
They treat it as a fixed point in time—a moment when a machine suddenly becomes powerful enough to break RSA or ECC.
In reality, Q-Day is the outcome of multiple accelerating curves:
Qubit stability and error correction
Joel Van Dyk
Mar 25


Provisional Trust: Crypto-Agility in an Age of Quantum Uncertainty
For decades, we operated under relatively stable assumptions. RSA and ECC were “good enough,” and the threat horizon for breaking them required either massive computational breakthroughs or exotic nation-state resources. Quantum computing changes that equation — not because it has already broken public-key cryptography at scale, but because it introduces structural uncertainty. Shor’s algorithm permanently altered our threat model for RSA and elliptic curve systems. PQC was b
Joel Van Dyk
Feb 25


Stop Hard-Coding Security: Why Declarative, Inherited Security Needs a Platform (Not Just Policies)
Most enterprise security environments still suffer from the same disease: security logic is scattered, duplicated, and inconsistently enforced across applications, platforms, and teams. One app checks group membership one way. Another hard-codes roles in config files. A third implements its own token parsing, its own policy logic, and its own edge cases. This is how you get drift. This is how you get gaps. And this is how you end up with “surprise” access paths no one can fu
Joel Van Dyk
Feb 12
You Can’t Do Quantitative Risk Without Calibrated Humans
In cybersecurity, it has become almost a reflexive mantra: we need quantitative risk management . I agree—but often for very different reasons than those usually given. Before we can talk about models, Monte Carlo simulations, FAIR analyses, or loss exceedance curves, we need to confront a more basic problem. We have not calibrated our detectors. I came to cybersecurity through experimental physics. In that world, measurement is everything—but measurement without calibration
Joel Van Dyk
Jan 22


Optimising Your Information Security Architecture for an Optimised Security Architecture
In today’s digital landscape, security isn’t just a checkbox on a compliance list. It’s the backbone of trust, especially for organisations handling sensitive data like financial institutions and event organisers. If you’re serious about protecting your assets and reputation, optimising your security architecture is non-negotiable. But what does that really mean? How do you go beyond the basics and build a system that’s both resilient and adaptable? Let’s dive in. Why an Opti
Joel M. Van Dyk, CISSP
Jan 12
The Importance of Security Architecture in Cyber Organizations
Understanding Security Architecture Security architecture is not merely about technology choices. It involves creating a holistic strategy that aligns security capabilities with business objectives, risk tolerance, regulatory requirements, and operational realities. Think of it as the blueprint for how all the pieces fit together. Without this blueprint, an organization may invest significant time and money in isolated security efforts that fail to contribute to meaningful r
Joel Van Dyk
Oct 9, 2025


Cybersecurity in Cloud Migration: Key Insights & Strategies
About 10+ years ago, one of my fellow enterprise architects came to me and said, "Joel, would your opinion on the cloud change if I cloud...
Joel M. Van Dyk, CISSP
Oct 3, 2025
Heathrow’s Cyberattack: A Pilot’s View on Grounding Risk and Quantum Security
When Heathrow Airport’s check-in systems went dark this week (September 2025) (see, for instance, https://www.capacitymedia.com/article-c...
Joel Van Dyk
Sep 24, 2025
Executive Orders on Cybersecurity — part 1, Quantum
I spent a good amount of time reading the two versions of the Presidential Executive Order on Cybersecurity 14144 from the Biden...
Joel Van Dyk
Jun 19, 2025


Why Artificial Intelligence is for Those Who Know How to Ask the Right Questions
The image features a bold, red "ASK" sign, emphasizing the importance of inquiry and curiosity in the realm of artificial intelligence....
Joel Van Dyk
Jan 23, 2025


Centralized Controls Assurance
Another day, another 14 point program inspired by a consulting company with project management to make a large checklist of controls that...
Joel Van Dyk
Oct 8, 2024
Security is a process it’s not a checkmark on a checklist
Security is a continuous process of adjustment and improvement as the threat environment changes. I recently read an article in CPO...
Joel Van Dyk
May 16, 2024
A Culture of Security
Many times in my decades of Cybersecurity I’ve been in a place where the Cybersecurity Program is in the skids. The CISO leans over the...
Joel Van Dyk
Mar 5, 2024


Risk Controls Compliance vs Risk Reduction
Risk Controls Compliance and Risk Reduction are 2 fundamental concepts in CyberSecurity. You can have the first without a lot of the 2nd,...
Joel Van Dyk
Dec 7, 2023
Lessons from the field: who should the CISO report to?
It’s spring (officially anyway), and everyone trots out the organizational article, who should the CISO report to? Besides being fun,...
Joel Van Dyk
Mar 23, 2023
How Risk should be measured in a Big Cybersecurity Dept
For the first article of the year I wanted to take a big picture approach. It’s often been said that the Cybersecurity department...
Joel Van Dyk
Mar 2, 2023
Notes from the field: Are you comfortable? Or a bad way to measure risk
I often hear this in meetings where we discuss risk. “Are you comfortable?” I always feel like answering: yes, I’m working from home,...
Joel Van Dyk
Nov 2, 2022
Where the rubber hits the road: Risk acceptance vs Risk Exception
One of the things you regularly get involved in as a CyberSec practitioner (sometimes several times a day) is an implementation of a...
Joel Van Dyk
Sep 29, 2022
bottom of page