Paul Lucier
Jun 28, 2018
Blockchain. Artificial intelligence. Machine learning. These have all become buzzwords in Washington as lawmakers hear about how these promising technologies are expected to benefit the American public…
Victoria de Quehen
Jun 14, 2018
While the ideal of public-key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one…
Alex Truskovsky
Apr 12, 2018
Crypto-agility is the key to cost-effectively migrate information and communication technology (ICT) systems from legacy to quantum-safe systems. By using our unique dual algorithm approach to certificates,…
Alex Truskovsky
Mar 27, 2018
With the latest release of the ISARA Radiate™ Security Solution Suite, we’ve added stateful hash-based signatures, specifically eXtended Merkle Signature Scheme (XMSS), to the cryptographic library. With…
Mike Brown
Jan 11, 2018
The quantum threat represents the first time in history that a cybersecurity breach will be the result of a complete break of modern public-key cryptography. For many, this information might come as a…