Insights on Cryptography, Quantum Readiness, and Security Strategy

Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.

Blog resources illustration
Tags:
Mar 15, 2022

Quantum-Safe Cryptography Standards Are Taking Off

With cryptography essential to every organization’s operation and continuity, progress on post-quantum cryptography standards is good news all around. By the end of March 2022, the National Institute of Standards and Technology (NIST) plans to announce the results of the third round of its Post-Quantum…

Philip Lafrance

Learn More

Feb 24, 2022

Cryptography and the Quantum Threat: The Sky is Not Falling

You remember Henny Penny, the iconic children’s folktale that’s been told and retold in different ways, across many countries since the early 1800s? Henny Penny (the hen) gets hit on the head with an acorn and she shrieks that the sky is falling. On her journey to tell the king, she proceeds to raise…

Paul Lucier

Learn More

Feb 08, 2022

Quantum-Safe Readiness: Where to Start?

The new year is a good time to learn something new, try different things, and make changes. Here’s your chance to do all three! ISARA’s senior advisor and co-founder, Mike Brown, participated in a four-part blog post series with Crypto4A Technologies via Venafi, in which he outlines the impact of quantum…

Philip Lafrance

Learn More

Dec 08, 2021

Your Post-Quantum Cryptography Journey: Over the River and Through the Woods

‘Tis the season for visits to grandmother and Uncle Joe. ‘Tis also the season for organizations to start planning their roadmaps for a quantum-safe New Year. After all, the third round of the NIST PQC Standardization Process is expected to be completed in early 2022 when the National Institute of Standards…

Paul Lucier

Learn More

Oct 20, 2021

10 Reasons Why Cryptographic Management is Critical

Why is cryptography suddenly becoming such a big topic? Let’s face it. Cryptography has been at the core of every secure transaction since the dawn of the Internet — unassuming and low profile, it has been working its security magic all the way from hardware to apps. Public key cryptography, to be more…

Sinisha Patkovic

Learn More

From Research to Action

Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.

Every Environment Is Different

If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.