Insights on Cryptography, Quantum Readiness, and Security Strategy
Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.
Tags:
Next-Generation Cryptographic Certificates: Toward Quantum-Safe Identity
Cryptographic certificates are used to prove a person’s, system’s, company’s or other entity’s identity. Today, cryptographic certificates are based on public-key cryptography, which is vulnerable to quantum computer-enabled adversaries. Learn more about protecting digital identities in this blog post…
The Quantum-Safe Migration: Cryptography’s Overhaul
On October 17th, the Hudson Institute – a think tank headquartered in Washington, DC – gathered quantum computing and cybersecurity experts to explore the quantum threat from a security and policy perspective. Mentioned several times throughout the event was the migration to a quantum-safe state. This…
Do You Know About Quantum’s Threat to OTA Software Updates?
Today, remotely updating a device’s software - such as a connected car or smartphone - is easy and cost-effective. There’s no need to physically return the device to the manufacturer, which happily saves everyone time and valuable resources. However, within the decade, remote or over-the-air (OTA)…
FinDEVr London 2017: Scott Totzke Talks About the Quantum Opportunity and Threat
On June 12, ISARA's CEO & Co-Founder, Scott Totzke, was at FinDEVr London 2017 to talk about the emerging quantum computing threat to cybersecurity standards that global financial institutions, as well as governments and businesses, rely on today. Scott explains quantum supremacy: what it means and…
IoT and The Quantum Threat. What To Do?
Many IoT experts surveyed by Pew are predicting that, by 2026, ubiquitous connectivity won’t be a choice but a necessity, with most people unaware of how connected they are or how much data they’re sharing. 2026 is the same date many quantum computing experts are predicting a quantum computer will be…
From Research to Action
Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.
Every Environment Is Different
If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.