ISARA Insights Blog
Featured Blog Post
Quantum Computing Urgency and Timeline
Atsushi Yamada
Apr 22, 2022
What is the quantum computing urgency, the latest post-quantum cryptography (PQC) timeline, and why should organizations prioritize this? The shift to quantum computing is going to be a massive one — as far as migration and transition planning and deployment — and companies need to start readying their systems, infrastructures, and applications now to manage security risks and maintain high performance throughout the transition. I recently presented at the Sectigo Summit 2022 to share insights on what’s needed during this process and why the management of cryptography that enterprises use and crypto agility are important.
Tags:
Quantum Computing Urgency and Timeline
Atsushi Yamada
Apr 22, 2022
What is the quantum computing urgency, the latest post-quantum cryptography (PQC) timeline, and why should organizations prioritize this? The shift to quantum computing is going to be a massive one — as…
Cryptography and the Quantum Threat: The Sky is Not Falling
Paul Lucier
Feb 24, 2022
You remember Henny Penny, the iconic children’s folktale that’s been told and retold in different ways, across many countries since the early 1800s? Henny Penny (the hen) gets hit on the head with an acorn…
Mastering the Quantum Challenge for Machine Identities
Mike Brown
Nov 11, 2020
It is no secret that cybersecurity threats are ever-evolving. Each day, security professionals around the world receive reports of new vulnerabilities, new attack vectors, and new challenges that need…
How to Start Readying Your IT Ecosystem for Quantum Now
Alex Truskovsky
Jun 16, 2020
Quantum computers will deliver tremendous benefits, but they will also be able to break the cryptography underlying public key infrastructure (PKI). Quantum computing will be able to solve very specific…
Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat
Mike Brown
Jan 17, 2020
The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI…