ISARA Insights Blog

Featured Blog Post

Plan Quantum-Safe Migrations Now to Avoid These 4 Pitfalls

ISARA Corporation
Jun 19, 2024

The quantum computing reality is drawing nearer — Y2Q, Quantum Day, Q-Day — when quantum computers will be able to break the public-key cryptography that currently safeguards most of the internet and the critical applications we rely on. As a result, it is becoming increasingly urgent for organizations to initiate their quantum-safe planning and migration efforts now, to ensure the continued integrity of their cybersecurity defences.

Read more


Plan Quantum-Safe Migrations Now to Avoid These 4 Pitfalls

ISARA Corporation
Jun 19, 2024

The quantum computing reality is drawing nearer — Y2Q, Quantum Day, Q-Day — when quantum computers will be able to break the public-key cryptography that currently safeguards most of the internet and the…

Read more


NIST’s Post-Quantum Signature On-Ramp Process: Round 1 Overview and Insights

Chris Leonardi
Apr 03, 2024

We will soon get an update from the National Institute of Standards and Technology (NIST) about its latest efforts to select and standardize quantum-safe signature schemes. While the end of the first round…

Read more


Quantum-Safe iMessage: Congrats, Apple!

Philip Lafrance
Mar 01, 2024

There is a lot of excitement in the quantum-safe community about Apple’s announcement to include post-quantum cryptography in the iMessage application. Dubbed PQ3, this new messaging protocol promises…

Read more


CEO Atsushi Yamada Discusses Post-Quantum Cryptography and How Organizations Must Act Now

ISARA Corporation
Feb 06, 2024

StrategicCIO360’s Katie Kuehner-Hebert interviewed Atsushi Yamada, CEO of ISARA, about the state of quantum computing and cybersecurity, and how organizations can act now to start preparing their post-quantum…

Read more


Data Security: What is Your Risk Tolerance?

Philip Lafrance
Oct 26, 2023

In today's technologically connected world, it is paramount for organizations to have a strategy for managing their information technology cyber (IT) risks. Without one, organizations are not only more…

Read more