Insights on Cryptography, Quantum Readiness, and Security Strategy

Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.

Blog resources illustration
Jun 28, 2018

Why are Washington lawmakers suddenly so interested in quantum tech?

Blockchain. Artificial intelligence. Machine learning. These have all become buzzwords in Washington as lawmakers hear about how these promising technologies are expected to benefit the American public and private sectors alike. The United States’ Congress has sought to understand how these emerging…

Paul Lucier

Learn More

Jun 14, 2018

A Short History of Public Key Cryptography

While the ideal of public-key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one cryptographic algorithm with a fixed set of parameters that will last indefinitely. As computers…

Victoria de Quehen

Learn More

May 02, 2018

What's the Rush on Quantum-Safe Security? You Already May Be Too Late

The following is an excerpt from a contributed opinion piece on Journal of Cyber Policy by Scott Totzke, CEO & Co-founder of ISARA Corporation. The dawn of the quantum computing era promises to fundamentally change the way we approach big problems – from researching cures for cancer to alleviating…

Scott Totzke

Learn More

Apr 26, 2018

The Peggy Smedley Show: Quantum Threats and Benefits

On April 24, ISARA Corporation's VP of Business Development, Paul Lucier, was invited to join The Peggy Smedley Show - one of the most influential, Internet of Things (IoT) podcasts discussing relevant tech trends – with Peggy Smedley.

ISARA Corporation

Learn More

Apr 24, 2018

ITU-T Update: Mark Pecen and Alex Truskovsky Talk Quantum-Safe X.509 Certificates

In April 2018, at the ITU-T Headquarters in Geneva, Matthew Dalais of ITU interviewed Mark Pecen, Chief Executive Officer, and Alexander Truskovsky, Senior Product Manager, about quantum-safe X.509 digital certificates and the most recent revision of this key standard in the public key infrastructure.

ISARA Corporation

Learn More

From Research to Action

Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.

Every Environment Is Different

If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.