Insights on Cryptography, Quantum Readiness, and Security Strategy

Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.

Blog resources illustration
Feb 24, 2020

Math Paths to Quantum-safe Security: Hash-based Cryptography

Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature algorithms will be vulnerable to quantum-enabled attacks. Hash-based cryptography is among the oldest…

Victoria de Quehen

Learn More

Jan 17, 2020

Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat

The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI and effects the way Elliptic Curve Cryptography (ECC) x.509 certificates are validated, giving…

Mike Brown

Learn More

Nov 12, 2019

Take the First Steps To Quantum-Safe Security Now to Avoid Mistakes Later

The following is an excerpt from a contributed opinion piece on Next Gov by Scott Totzke, CEO & Co-founder of ISARA Corporation. No enterprise—whether a government, a military or a private company—can afford to be unprepared.

Scott Totzke

Learn More

Oct 02, 2019

Quantum-Safe Cryptography: The Time to Prepare Is Now

The following is an excerpt from a contributed opinion piece on DARK Reading by Scott Totzke, CEO & Co-founder of ISARA Corporation. Quantum computing is real and it's evolving fast. Is the security industry up to the challenge?

Scott Totzke

Learn More

Jul 23, 2019

Myth-Busting the Quantum Threat: The Top 3 Misconceptions About Quantum-Safe Migrations

Part of our mission at ISARA is to educate and raise awareness of the security risks introduced by large-scale quantum computing. Since I joined ISARA in 2016, I’ve spoken to individuals, enterprises, and governments around the world, and along the way, I’ve heard some incorrect assumptions about the…

Paul Lucier

Learn More

From Research to Action

Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.

Every Environment Is Different

If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.