Insights on Cryptography, Quantum Readiness, and Security Strategy

Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.

Blog resources illustration
Feb 25, 2021

The Road Ahead: Post-Quantum Cryptography

Are we there yet? If you have traveled on a road trip with children, you probably have been asked this a hundred times. As with any road trip, you likely have done some pre-planning — a full tank of gas, some idea of where you’re going, GPS or a map, clothes packed, snacks, music. You are usually somewhat…

Philip Lafrance

Learn More

Feb 08, 2021

Is Your Cryptographic Infrastructure Healthy?

What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography? With enterprises planning the migration of their entire cryptographic assets from classical…

Philip Lafrance

Learn More

Jan 25, 2021

Crypto-pocalypse? Crypto-agility? Expanding Your Quantum Vocabulary in 2021

Will your organization survive the crypto-pocalypse? “The power of quantum computing brings the day closer when the conventional encryption we all rely on can no longer protect us,” warns Roger A. Grimes, cybersecurity author and columnist. In his CSO article, he discusses how quantum supremacy will…

Philip Lafrance

Learn More

Nov 23, 2020

“Cryptography is Everywhere:”
Trends for 2021

“Cryptography is effectively everywhere,” states Mike Brown, CTO of ISARA. A foundational technology in almost everything we do today — banking, working, grocery shopping, streaming videos, traveling. With 2021 around the corner, what are the top cryptography trends that organizations need to be aware…

Paul Lucier

Learn More

Nov 11, 2020

Mastering the Quantum Challenge for Machine Identities

It is no secret that cybersecurity threats are ever-evolving. Each day, security professionals around the world receive reports of new vulnerabilities, new attack vectors, and new challenges that need to be overcome in this increasingly connected world. To make matters worse, cyberattacks are not only…

Mike Brown

Learn More

From Research to Action

Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.

Every Environment Is Different

If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.