ISARA Insights Blog

Featured Blog Post

NIST’s Post-Quantum Signature On-Ramp Process: Round 1 Overview and Insights

Chris Leonardi
Apr 03, 2024

We will soon get an update from the National Institute of Standards and Technology (NIST) about its latest efforts to select and standardize quantum-safe signature schemes. While the end of the first round of this process has not yet been announced, NIST has indicated that it will happen sometime after the Fifth NIST PQC Standardization Conference, being held April 10-12, 2024. With this in mind, we wanted to summarize the submitted signature schemes to date and share our opinions on some of the candidates.

Read more


NIST’s Post-Quantum Signature On-Ramp Process: Round 1 Overview and Insights

Chris Leonardi
Apr 03, 2024

We will soon get an update from the National Institute of Standards and Technology (NIST) about its latest efforts to select and standardize quantum-safe signature schemes. While the end of the first round…

Read more


Quantum-Safe iMessage: Congrats, Apple!

Philip Lafrance
Mar 01, 2024

There is a lot of excitement in the quantum-safe community about Apple’s announcement to include post-quantum cryptography in the iMessage application. Dubbed PQ3, this new messaging protocol promises…

Read more


CEO Atsushi Yamada Discusses Post-Quantum Cryptography and How Organizations Must Act Now

ISARA Corporation
Feb 06, 2024

StrategicCIO360’s Katie Kuehner-Hebert interviewed Atsushi Yamada, CEO of ISARA, about the state of quantum computing and cybersecurity, and how organizations can act now to start preparing their post-quantum…

Read more


Make 2024 the Time to Inventory Your Cryptographic Assets

ISARA Corporation
Jan 09, 2024

Quantum computing and the great security risks it poses to current cryptography continue to be top of mind across government agencies, enterprises, and standards organizations. These organizations are…

Read more


Data Security: What is Your Risk Tolerance?

Philip Lafrance
Oct 26, 2023

In today's technologically connected world, it is paramount for organizations to have a strategy for managing their information technology cyber (IT) risks. Without one, organizations are not only more…

Read more