This article discusses the Equifax data breach, including the problem behind the incident, who was impacted, and how the data breach took place. It also explains the concept and mechanism of quantum key distribution (QKD) and the future trends of QKD. Additionally, it compares different types of firewalls, including packet filtering firewall, application proxy firewall, stateful packet filter firewall, and circuit level gateway firewall, and provides their functionality, speed, applications, and cost.