ISARA Insights Blog
Quantum Computing Urgency and Timeline
What is the quantum computing urgency, the latest post-quantum cryptography (PQC) timeline, and why should organizations prioritize this? The shift to quantum computing is going to be a massive one — as far as migration and transition planning and deployment — and companies need to start readying their…
Tags:
Quantum Computing Urgency and Timeline
What is the quantum computing urgency, the latest post-quantum cryptography (PQC) timeline, and why should organizations prioritize this? The shift to quantum computing is going to be a massive one — as far as migration and transition planning and deployment — and companies need to start readying their…
Cryptography and the Quantum Threat: The Sky is Not Falling
You remember Henny Penny, the iconic children’s folktale that’s been told and retold in different ways, across many countries since the early 1800s? Henny Penny (the hen) gets hit on the head with an acorn and she shrieks that the sky is falling. On her journey to tell the king, she proceeds to raise…
Mastering the Quantum Challenge for Machine Identities
It is no secret that cybersecurity threats are ever-evolving. Each day, security professionals around the world receive reports of new vulnerabilities, new attack vectors, and new challenges that need to be overcome in this increasingly connected world. To make matters worse, cyberattacks are not only…
How to Start Readying Your IT Ecosystem for Quantum Now
Quantum computers will deliver tremendous benefits, but they will also be able to break the cryptography underlying public key infrastructure (PKI). Quantum computing will be able to solve very specific hard problems that even the fastest supercomputers cannot solve in a reasonable amount of time today.…
Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat
The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI and effects the way Elliptic Curve Cryptography (ECC) x.509 certificates are validated, giving…