Insights on Cryptography, Quantum Readiness, and Security Strategy

Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.

Blog resources illustration
Nov 08, 2017

Next-Generation Cryptographic Certificates: Toward Quantum-Safe Identity

Cryptographic certificates are used to prove a person’s, system’s, company’s or other entity’s identity. Today, cryptographic certificates are based on public-key cryptography, which is vulnerable to quantum computer-enabled adversaries. Learn more about protecting digital identities in this blog post…

Mark Pecen

Learn More

Oct 26, 2017

The Quantum-Safe Migration: Cryptography’s Overhaul

On October 17th, the Hudson Institute – a think tank headquartered in Washington, DC – gathered quantum computing and cybersecurity experts to explore the quantum threat from a security and policy perspective. Mentioned several times throughout the event was the migration to a quantum-safe state. This…

Scott Totzke

Learn More

Oct 17, 2017

Do You Know About Quantum’s Threat to OTA Software Updates?

Today, remotely updating a device’s software - such as a connected car or smartphone - is easy and cost-effective. There’s no need to physically return the device to the manufacturer, which happily saves everyone time and valuable resources. However, within the decade, remote or over-the-air (OTA)…

Alex Truskovsky

Learn More

Jul 04, 2017

FinDEVr London 2017: Scott Totzke Talks About the Quantum Opportunity and Threat

On June 12, ISARA's CEO & Co-Founder, Scott Totzke, was at FinDEVr London 2017 to talk about the emerging quantum computing threat to cybersecurity standards that global financial institutions, as well as governments and businesses, rely on today. Scott explains quantum supremacy: what it means and…

ISARA Corporation

Learn More

Jun 28, 2017

IoT and The Quantum Threat. What To Do?

Many IoT experts surveyed by Pew are predicting that, by 2026, ubiquitous connectivity won’t be a choice but a necessity, with most people unaware of how connected they are or how much data they’re sharing. 2026 is the same date many quantum computing experts are predicting a quantum computer will be…

Scott Totzke

Learn More

From Research to Action

Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.

Every Environment Is Different

If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.