Insights on Cryptography, Quantum Readiness, and Security Strategy

Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.

Blog resources illustration
Oct 07, 2020

US Government’s Deep Dive into China and Why the Quantum Threat Matters

China continues to make significant advances in quantum science and with quantum communication networks. Do these developments pose a threat we should be worried about? The US Congress thinks so. On September 30th, the House Intelligence Committee released “The China Deep Dive.”

Paul Lucier

Learn More

Jul 16, 2020

All Aboard the Quantum Migration Train

Standards bodies, government organizations, and research centers weigh in on preparing for the threat that quantum computers pose to encryption. Take action now? Don’t worry about it yet? Or, get on the quantum migration train now starting with planning and crypto-agility solutions?

Scott Totzke

Learn More

Jun 16, 2020

How to Start Readying Your IT Ecosystem for Quantum Now

Quantum computers will deliver tremendous benefits, but they will also be able to break the cryptography underlying public key infrastructure (PKI). Quantum computing will be able to solve very specific hard problems that even the fastest supercomputers cannot solve in a reasonable amount of time today.…

Alex Truskovsky

Learn More

Apr 29, 2020

RAND Corporation Report: Quantum Threat

This month the RAND corporation released a new report investigating the quantum threat. The authors consider three key timelines in the coming paradigm shift to quantum-safe cryptography. They investigated when a large-scale quantum computer might be built, how long it might take to complete standards…

Philip Lafrance

Learn More

Mar 26, 2020

COVID-19: A message from our Co-founders

During this difficult time, we first hope that you and your loved ones are safe and healthy. As the world continues to experience rapid changes, we would like to share with you how we've adapted to the ongoing pandemic and how we're meeting the challenges at hand to do our part in reducing the spread…

ISARA Corporation

Learn More

From Research to Action

Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.

Every Environment Is Different

If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.