ISARA Insights Blog

Celebrating International Women's Day at ISARA with Jacquelyn Parker, Vice President of Operations
/

International Women’s Day 2019: Jacquelyn Parker created her own path, with tenacity and by trusting her instincts

Jacquelyn Parker, ISARA’s Vice President of Operations, has always carved out her own path, both professionally and personally. Learn more ...
Read more
NIST Round Two: One Step Closer to Standardization
/

NIST Round Two: One Step Closer to Standardization

Best practices for cryptography evolve with time and staying secure sometimes requires immediate reaction. The transition to Elliptic Curve Cryptography ...
Read more
QKD & QSC
/

Quantum Key Distribution and Quantum-Safe Cryptography: two (complementary) approaches to becoming quantum-ready

Every advancement in quantum computing brings us closer to the positive and negative disruptions this revolutionary technology promises. Though a ...
Read more
Quantum-safe world
/

We’re on a mission to create a quantum-safe world

Scott Totzke, CEO & Co-founder of ISARA, talks about what our recent Series A investment announcement means for the future ...
Read more
The PKI Guy talks quantum-safe security with Alexander Truskovsky
/

The PKI Guy talks quantum-safe security with Alexander Truskovsky

Our Senior Product Manager, Alexander Truskovsky, sat down with Mark B. Cooper of PKI Solutions Inc (A.K.A The PKI Guy) ...
Read more
Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography
/

Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

One of the most widely deployed public key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as ...
Read more
quantum
/

Why are Washington lawmakers suddenly so interested in quantum tech?

With increased investments in quantum technology by nation states such as China and Russia, the heat is on for the ...
Read more
A Short History of Public Key Cryptography
/

A Short History of Public Key Cryptography

While the ideal of public key cryptography is to have a “set and forget" group of algorithms that will guarantee ...
Read more
What's the Rush on Quantum-Safe Security? You Already May Be Too Late
/

What’s the Rush on Quantum-Safe Security? You Already May Be Too Late

The following is an excerpt from a contributed opinion piece on Journal of Cyber Policy by Scott Totzke, CEO & ...
Read more
Loading...

Archive