By: Hunter Storm
Published:

Hunter Storm is a CISO, Advisory Board Member, SOC Black Ops Team Member, Systems Architect, QED-C TAC Relationship Leader, and Cyber-Physical Hybrid Threat Expert with decades of experience in global Fortune 100 companies. She is the originator of the Hacking Humans: The Ports and Services Model of Social Engineering framework (1994–2007), the earliest structured model for human attack surfaces, and the creator of The Storm Project: AI, Cybersecurity, Quantum, and the Future of Intelligence. She contributes to ANSI X9, FS-ISAC, NIST, and QED-C, analyzing cybersecurity, financial systems, platform governance, and systemic risk across complex socio-technical systems.
Strategic Security and Technology Briefings
This collection provides concise, actionable briefings on emerging technology, cybersecurity, and operational risk. Each briefing is designed to deliver timely insights and strategic perspectives for decision-makers, analysts, and practitioners.
Stay informed on the latest trends and forward-looking analysis across multiple domains. More briefings on cutting-edge topics will be added regularly, providing a growing repository of authoritative guidance.
List of Briefings
Title: Quantum Technology and Security Status Update 2025
Date: December 22, 2025
Summary: Briefing by Hunter Storm on quantum tech and quantum security status 2025: PQC, QKD, QRNG, qubits, hardware, vendors, standards, enterprise adoption strategies.
Link: Quantum Technology and Security Status 2025
Tags: Quantum, Emerging Technology, Security, Strategic Insight
Discover More from Hunter Storm
- About Hunter Storm
- Author
- Case Studies
- Crisis Leadership | Lessons from the Shadow CISO During the Wells Fargo Sales Practices Scandal
- Digital Obstruction of Justice | Locked Out of Legal Recourse
- Emerging Tech Threats | Analysis of NATO-Defined Spectrum of Emerging and Disruptive Technologies (EDTs) Series
- Ghost Ops | Hidden Frontlines of Cybersecurity and Digital Strategy Series
- Hacking Humans | The Ports and Services Model of Social Engineering
- How to Avoid a Social Media Ban
- How to Build an Online Presence You Actually Own
- Hunter Storm Official Site
- Outsmart the Machine | Cybersecurity Guide for Humans
- Reports
- Résumé | Strategic Consultant: AI, Cybersecurity, Quantum, and Intelligence
- Professional Services
- Leadership Profile
- Profile and Career Highlights
- Projects
- Publications
- StormWatch | Real-World Cybersecurity Advisories
- The AI Trust Paradox | When Automation Becomes a Bigger Security Risk Than Human Error
- The Valkyrie’s Voice
- Viewpoint Discrimination by Design | The First Global Forensic Mapping of Digital Repression Architecture
- White Papers
