ISARA Insights Blog

Featured Blog Post

Is Your Cryptographic Infrastructure Healthy?

Philip Lafrance
Feb 08, 2021

What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography? With enterprises planning the migration of their entire cryptographic assets from classical public-key cryptography to quantum-safe cryptography, they can improve their infrastructure wellness now by taking preventative steps with crypto-agile solutions. Think of crypto-agility as the “super food” for cryptographic wellness.

Read more


Is Your Cryptographic Infrastructure Healthy?

Philip Lafrance
Feb 08, 2021

What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography?…

Read more


Mastering the Quantum Challenge for Machine Identities

Mike Brown
Nov 11, 2020

It is no secret that cybersecurity threats are ever-evolving. Each day, security professionals around the world receive reports of new vulnerabilities, new attack vectors, and new challenges that need…

Read more


NIST Advances to Selection Round

Paul Lucier
Jul 30, 2020

On July 22nd National Institute of Standards and Technology (NIST) announced that they have entered the ‘selection’ round in the process of standardizing post-quantum cryptography. If you’re reading this,…

Read more


Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat

Mike Brown
Jan 17, 2020

The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI…

Read more


Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

Victoria de Quehen
Jul 27, 2018

One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…

Read more