ISARA Insights Blog

Featured Blog Post

Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat

Mike Brown
Jan 17, 2020

The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI and effects the way Elliptic Curve Cryptography (ECC) x.509 certificates are validated, giving attackers the ability to “undermine how Windows verifies cryptographic trust,” as stated in the NSA’s Cybersecurity Advisory on this issue.

Read more


Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat

Mike Brown
Jan 17, 2020

The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI…

Read more


Take the First Steps To Quantum-Safe Security Now to Avoid Mistakes Later

Scott Totzke
Nov 12, 2019

The following is an excerpt from a contributed opinion piece on Next Gov by Scott Totzke, CEO & Co-founder of ISARA Corporation. No enterprise—whether a government, a military or a private company—can…

Read more


Quantum-Safe Cryptography: The Time to Prepare Is Now

Scott Totzke
Oct 02, 2019

The following is an excerpt from a contributed opinion piece on DARK Reading by Scott Totzke, CEO & Co-founder of ISARA Corporation. Quantum computing is real and it's evolving fast. Is the security industry…

Read more


Myth-Busting the Quantum Threat: The Top 3 Misconceptions About Quantum-Safe Migrations

Paul Lucier
Jul 23, 2019

Part of our mission at ISARA is to educate and raise awareness of the security risks introduced by large-scale quantum computing. Since I joined ISARA in 2016, I’ve spoken to individuals, enterprises,…

Read more


Top 3 Noteworthy Advances in the Quantum-safe Security Market

Paul Lucier
Jul 02, 2019

Awareness is spreading about the threat that large-scale quantum computing poses to current public key cryptography, and both nation-states and security professionals are taking note.

Read more