ISARA Insights Blog

Featured Blog Post

The ABCs of Harvest and Decrypt

Philip Lafrance
Feb 24, 2025

As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged to start preparing for quantum-capable adversaries. And for several very good reasons. If you’re familiar with the quantum-threat to cryptography, you’ve likely heard that current encryption algorithms are vulnerable to quantum computing attacks. You may have come across discussions about post-quantum cryptography standards. And perhaps you’ve heard that today’s encrypted data could be at risk from tomorrow’s quantum-enabled attackers.

Read more

Tags:

Quantum Computing: Its Emergence & Implications on Information Security

Mark Pecen
Dec 19, 2017

Leading governments around the globe, along with major corporations, including IBM, Google, Microsoft, have all made substantial investments in the development of large-scale quantum computers, just in…

Read more


Next-Generation Cryptographic Certificates: Toward Quantum-Safe Identity

Mark Pecen
Nov 08, 2017

Cryptographic certificates are used to prove a person’s, system’s, company’s or other entity’s identity. Today, cryptographic certificates are based on public-key cryptography, which is vulnerable to quantum…

Read more