Featured Blog Post
Philip Lafrance
Feb 24, 2025
As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged to start preparing for quantum-capable adversaries. And for several very good reasons. If you’re familiar with the quantum-threat to cryptography, you’ve likely heard that current encryption algorithms are vulnerable to quantum computing attacks. You may have come across discussions about post-quantum cryptography standards. And perhaps you’ve heard that today’s encrypted data could be at risk from tomorrow’s quantum-enabled attackers.
Philip Lafrance
Feb 24, 2025
As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged…
Philip Lafrance
Sep 11, 2024
Given the enormity of an organization’s quantum-safe migration, it makes good sense for them to do as much planning and preparation as possible ahead of time. Tremendous benefits can be realized by doing…
ISARA Corporation
Aug 13, 2024
August 13, 2024. Post-Quantum Cryptography Day. Quantum-Safe Standards Day. Tuesday. Whatever you prefer to call it, it’s a historic day. Today, a critical milestone has been reached on the journey to…
ISARA Corporation
Jun 19, 2024
The quantum computing reality is drawing nearer — Y2Q, Quantum Day, Q-Day — when quantum computers will be able to break the public-key cryptography that currently safeguards most of the internet and the…
Paul Lucier
Jul 27, 2021
Cryptography is the foundation of authentication, authorization, confidentiality, data integrity, and more. It is the foundation of digital trust; it is the enabler of overall enterprise security. Any…