ISARA Insights Blog

Featured Blog Post

The ABCs of Harvest and Decrypt

Philip Lafrance
Feb 24, 2025

As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged to start preparing for quantum-capable adversaries. And for several very good reasons. If you’re familiar with the quantum-threat to cryptography, you’ve likely heard that current encryption algorithms are vulnerable to quantum computing attacks. You may have come across discussions about post-quantum cryptography standards. And perhaps you’ve heard that today’s encrypted data could be at risk from tomorrow’s quantum-enabled attackers.

Read more

Tags:

The ABCs of Harvest and Decrypt

Philip Lafrance
Feb 24, 2025

As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged…

Read more


Top 17 Reasons to Begin Your Quantum-Safe Migration Now

Philip Lafrance
Sep 11, 2024

Given the enormity of an organization’s quantum-safe migration, it makes good sense for them to do as much planning and preparation as possible ahead of time. Tremendous benefits can be realized by doing…

Read more


Quantum-Safe Standards Have Arrived

ISARA Corporation
Aug 13, 2024

August 13, 2024. Post-Quantum Cryptography Day. Quantum-Safe Standards Day. Tuesday. Whatever you prefer to call it, it’s a historic day. Today, a critical milestone has been reached on the journey to…

Read more


Make 2024 the Time to Inventory Your Cryptographic Assets

ISARA Corporation
Jan 09, 2024

Quantum computing and the great security risks it poses to current cryptography continue to be top of mind across government agencies, enterprises, and standards organizations. These organizations are…

Read more


Data Security: What is Your Risk Tolerance?

Philip Lafrance
Oct 26, 2023

In today's technologically connected world, it is paramount for organizations to have a strategy for managing their information technology cyber (IT) risks. Without one, organizations are not only more…

Read more