ISARA Insights Blog
Tags:
Cryptography and the Quantum Threat: The Sky is Not Falling
You remember Henny Penny, the iconic children’s folktale that’s been told and retold in different ways, across many countries since the early 1800s? Henny Penny (the hen) gets hit on the head with an acorn and she shrieks that the sky is falling. On her journey to tell the king, she proceeds to raise…
Industry Experts Weigh in on Crypto-Agility
Crypto-agility is a term that has come to the forefront in the last two years. Today, the industry is abuzz with talk about how crypto-agility can be used to defend against the cryptographic risks posed by quantum computing. “The idea behind crypto-agility is to adapt to an alternative cryptographic…
The Road Ahead: Post-Quantum Cryptography
Are we there yet? If you have traveled on a road trip with children, you probably have been asked this a hundred times. As with any road trip, you likely have done some pre-planning — a full tank of gas, some idea of where you’re going, GPS or a map, clothes packed, snacks, music. You are usually somewhat…
Is Your Cryptographic Infrastructure Healthy?
What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography? With enterprises planning the migration of their entire cryptographic assets from classical…
Mastering the Quantum Challenge for Machine Identities
It is no secret that cybersecurity threats are ever-evolving. Each day, security professionals around the world receive reports of new vulnerabilities, new attack vectors, and new challenges that need to be overcome in this increasingly connected world. To make matters worse, cyberattacks are not only…