ISARA Insights Blog

Featured Blog Post

10 Reasons Why Cryptographic Management is Critical

Sinisha Patkovic
Oct 20, 2021

Why is cryptography suddenly becoming such a big topic? Let’s face it. Cryptography has been at the core of every secure transaction since the dawn of the Internet — unassuming and low profile, it has been working its security magic all the way from hardware to apps. Public key cryptography, to be more exact, ensures the authentication and identity of all transactions and participants in the digital world.

Read more


10 Reasons Why Cryptographic Management is Critical

Sinisha Patkovic
Oct 20, 2021

Why is cryptography suddenly becoming such a big topic? Let’s face it. Cryptography has been at the core of every secure transaction since the dawn of the Internet — unassuming and low profile, it has…

Read more


Is Your Cryptographic Infrastructure Healthy?

Philip Lafrance
Feb 08, 2021

What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography?…

Read more


NIST Advances to Selection Round

Paul Lucier
Jul 30, 2020

On July 22nd National Institute of Standards and Technology (NIST) announced that they have entered the ‘selection’ round in the process of standardizing post-quantum cryptography. If you’re reading this,…

Read more


Math Paths to Quantum-safe Security: Hash-based Cryptography

Victoria de Quehen
Feb 24, 2020

Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature…

Read more


ISARA Radiate™ Security Solution Suite 1.4 Brings XMSS to Complete its Offering of Stateful Hash-Based Signatures for Quantum-Safe Roots of Trust

Alex Truskovsky
Mar 27, 2018

With the latest release of the ISARA Radiate™ Security Solution Suite, we’ve added stateful hash-based signatures, specifically eXtended Merkle Signature Scheme (XMSS), to the cryptographic library. With…

Read more