Insights on Cryptography, Quantum Readiness, and Security Strategy

Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.

Blog resources illustration
Tags:
Dec 08, 2022

Quantum Computing Explained: Latest X9 Report Now Available

The latest resource on quantum computing is now available, prepared by the Accredited Standards Committee (ASC) X9 Inc. Quantum Computing Risks to the Financial Services Industry provides background on the principles of quantum computing, the current state of quantum computing as it pertains to the financial…

ISARA Corporation

Learn More

Oct 03, 2022

Four Quantum-Safe Migration Recommendations from ICMC22

This year’s International Cryptographic Module Conference, held in Arlington, V.A., USA, brought together global leaders in commercial cryptography. It was great to see some old faces, make new acquaintances, and put faces to the voices we have been chatting with online over the past few years.

Philip Lafrance

Learn More

Aug 02, 2022

The Great Quantum Journey: It's Time to Accelerate

After years of careful analysis, the National Institute of Standards and Technology (NIST) has announced the selection of four quantum-safe algorithms for standardization: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. "This announcement represents a significant milestone toward a quantum-safe…

ISARA Corporation

Learn More

Jul 06, 2022

NIST Announces Quantum-Safe Algorithms: The New Horizon in Quantum Preparedness

The “dawning of aquarius” is an astrological era believed to bring increased spirituality and harmony on earth. While it is too early to say if quantum computing will bring spirituality and harmony on earth, industry experts, luminaries, and academia have been forecasting and speculating for a long time…

Philip Lafrance

Learn More

Apr 22, 2022

Quantum Computing Urgency and Timeline

What is the quantum computing urgency, the latest post-quantum cryptography (PQC) timeline, and why should organizations prioritize this? The shift to quantum computing is going to be a massive one — as far as migration and transition planning and deployment — and companies need to start readying their…

Atsushi Yamada

Learn More

From Research to Action

Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.

Every Environment Is Different

If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.