ISARA Insights Blog
Cybersecurity in the Age of Quantum Computing: A Cryptographer’s Call to Action
Computing power has advanced far beyond the invention of the transistor. Today’s digital infrastructures rely on public-key cryptography to safeguard commerce, state secrets and personal privacy. But a new paradigm is within our view. Quantum computers utilize superposition and entanglement to perform…
Tags:
The ABCs of Harvest and Decrypt
As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged to start preparing for quantum-capable adversaries. And for several very good reasons. If you’re…
Top 17 Reasons to Begin Your Quantum-Safe Migration Now
Given the enormity of an organization’s quantum-safe migration, it makes good sense for them to do as much planning and preparation as possible ahead of time. Tremendous benefits can be realized by doing the work now rather than delaying. Conversely, significant risk can be incurred by putting off migration…
Quantum-Safe iMessage: Congrats, Apple!
There is a lot of excitement in the quantum-safe community about Apple’s announcement to include post-quantum cryptography in the iMessage application. Dubbed PQ3, this new messaging protocol promises to provide next-generation, end-to-end security for potentially billions of users worldwide.
Data Security: What is Your Risk Tolerance?
In today's technologically connected world, it is paramount for organizations to have a strategy for managing their information technology cyber (IT) risks. Without one, organizations are not only more susceptible to cyberattacks, but it makes it harder for them to adapt to new technologies and risks…
Three Reasons for Starting Cryptographic Discovery Now
As many know, the National Cybersecurity Center of Excellence (NCCoE) has been leading a consortium of public and private organizations to develop concrete guidance and recommendations for organizations to adopt post-quantum cryptography (PQC). As Y2Q draws nearer, it becomes increasingly important for…