Insights on Cryptography, Quantum Readiness, and Security Strategy
Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.
Tags:
The Future of Post-Quantum Cryptography: Standards and Applications
Inside Quantum Technology, to be held June 20-22, 2023, features ISARA’s CEO Atsushi Yamada on the panel "The Future of PQC: Standards and Applications." Atsushi joins moderator Francis Bellido, Quantum eMotion and fellow panelists Michael Redding, Quantropi Inc. and Sarah McCarthy, evolutionQ. We sat…
A Q&A with Atsushi Yamada: PQC, Addressing Risk Management Needs, What’s Ahead
Mirko Zorz, director of content with Help Net Security, interviewed Atsushi Yamada, CEO of ISARA, to discuss the threat of cryptographically relevant quantum computers (CRQCs) and what’s ahead for the company.
A Discussion on Hybrid Certificates: A Foundation for Post-Quantum Migrations
Atsushi Yamada recently joined Sectigo’s Tim Callan, Chief Experience Officer, and Jason Soroko, SVP of Product, on the Root Causes: PKI & Security podcast, to discuss the role of hybrid certificates in post-quantum cryptography (PQC) and ongoing crypto agility.
A Recap of the 9th ETSI/IQC Quantum Safe Workshop
The ETSI/IQC Quantum Safe Workshop returned last week after a one year hiatus, held in-person at ETSI’s headquarters in the beautiful South of France. Regarded by many as the world’s premier event in quantum-safe security, the Workshop yet again brought together a diverse blend of talent, experience,…
Quantum Computing Explained: Latest X9 Report Now Available
The latest resource on quantum computing is now available, prepared by the Accredited Standards Committee (ASC) X9 Inc. Quantum Computing Risks to the Financial Services Industry provides background on the principles of quantum computing, the current state of quantum computing as it pertains to the financial…
From Research to Action
Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.
Every Environment Is Different
If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.