ISARA Insights Blog


How Quantum Computing’s Threat to Security is Different from All Other Security Breaches

Mike Brown
Jan 11, 2018

The quantum threat represents the first time in history that a cybersecurity breach will be the result of a complete break of modern public-key cryptography. For many, this information might come as a…

Read more


Quantum Computing: Its Emergence & Implications on Information Security

Mark Pecen
Dec 19, 2017

Leading governments around the globe, along with major corporations, including IBM, Google, Microsoft, have all made substantial investments in the development of large-scale quantum computers, just in…

Read more


Why Quantum Computing is a Board Level Security Risk

Scott Totzke
Dec 13, 2017

In recent years, there has been an undisputed increase in enterprise data breaches across the globe. At first, this was only a concern for IT, CISO’s and CIO’s. However, with growing fiduciary responsibility,…

Read more


Next-Generation Cryptographic Certificates: Toward Quantum-Safe Identity

Mark Pecen
Nov 08, 2017

Cryptographic certificates are used to prove a person’s, system’s, company’s or other entity’s identity. Today, cryptographic certificates are based on public-key cryptography, which is vulnerable to quantum…

Read more


The Quantum-Safe Migration: Cryptography’s Overhaul

Scott Totzke
Oct 26, 2017

On October 17th, the Hudson Institute – a think tank headquartered in Washington, DC – gathered quantum computing and cybersecurity experts to explore the quantum threat from a security and policy perspective.…

Read more