ISARA Insights Blog

Featured Blog Post

Quantum Key Distribution and Quantum-Safe Cryptography: two (complementary) approaches to becoming quantum-ready

Martin Laforest
Nov 29, 2018

Every advancement in quantum computing brings us closer to the positive and negative disruptions this revolutionary technology promises. Though a large-scale quantum computer is not here yet, its future arrival already puts many aspects of information security at risk today because of “harvest-and-decrypt” attacks, for example, where adversaries collect and store encrypted data with the intention of decrypting it in the future.

Read more


Quantum Key Distribution and Quantum-Safe Cryptography: two (complementary) approaches to becoming quantum-ready

Martin Laforest
Nov 29, 2018

Every advancement in quantum computing brings us closer to the positive and negative disruptions this revolutionary technology promises. Though a large-scale quantum computer is not here yet, its future…

Read more


How Quantum Computing’s Threat to Security is Different from All Other Security Breaches

Mike Brown
Jan 11, 2018

The quantum threat represents the first time in history that a cybersecurity breach will be the result of a complete break of modern public-key cryptography. For many, this information might come as a…

Read more


Why Quantum Computing is a Board Level Security Risk

Scott Totzke
Dec 13, 2017

In recent years, there has been an undisputed increase in enterprise data breaches across the globe. At first, this was only a concern for IT, CISO’s and CIO’s. However, with growing fiduciary responsibility,…

Read more