ISARA Insights Blog
Featured Blog Post
Philip Lafrance
Feb 24, 2025
As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged to start preparing for quantum-capable adversaries. And for several very good reasons. If you’re familiar with the quantum-threat to cryptography, you’ve likely heard that current encryption algorithms are vulnerable to quantum computing attacks. You may have come across discussions about post-quantum cryptography standards. And perhaps you’ve heard that today’s encrypted data could be at risk from tomorrow’s quantum-enabled attackers.
Paul Lucier
Feb 24, 2022
You remember Henny Penny, the iconic children’s folktale that’s been told and retold in different ways, across many countries since the early 1800s? Henny Penny (the hen) gets hit on the head with an acorn…
Paul Lucier
Dec 08, 2021
‘Tis the season for visits to grandmother and Uncle Joe. ‘Tis also the season for organizations to start planning their roadmaps for a quantum-safe New Year. After all, the third round of the NIST PQC…
Paul Lucier
Oct 13, 2021
Cryptography is everywhere — at the core of every secure transaction, every safe automobile, every form of communication. That’s why cryptographic management is oh-so-critical, yet sometimes challenging…
Paul Lucier
Jul 27, 2021
Cryptography is the foundation of authentication, authorization, confidentiality, data integrity, and more. It is the foundation of digital trust; it is the enabler of overall enterprise security. Any…
Paul Lucier
Jul 13, 2021
For gardeners, summer is the growing season. As any gardener knows, a successful garden requires work throughout the year. In the autumn, you tidy up last year’s scraggly plants and you mulch. In the winter,…