ISARA Insights Blog

Featured Blog Post

The ABCs of Harvest and Decrypt

Philip Lafrance
Feb 24, 2025

As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged to start preparing for quantum-capable adversaries. And for several very good reasons. If you’re familiar with the quantum-threat to cryptography, you’ve likely heard that current encryption algorithms are vulnerable to quantum computing attacks. You may have come across discussions about post-quantum cryptography standards. And perhaps you’ve heard that today’s encrypted data could be at risk from tomorrow’s quantum-enabled attackers.

Read more


The ABCs of Harvest and Decrypt

Philip Lafrance
Feb 24, 2025

As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged…

Read more


Top 17 Reasons to Begin Your Quantum-Safe Migration Now

Philip Lafrance
Sep 11, 2024

Given the enormity of an organization’s quantum-safe migration, it makes good sense for them to do as much planning and preparation as possible ahead of time. Tremendous benefits can be realized by doing…

Read more


Quantum-Safe Standards Have Arrived

ISARA Corporation
Aug 13, 2024

August 13, 2024. Post-Quantum Cryptography Day. Quantum-Safe Standards Day. Tuesday. Whatever you prefer to call it, it’s a historic day. Today, a critical milestone has been reached on the journey to…

Read more


Plan Quantum-Safe Migrations Now to Avoid These 4 Pitfalls

ISARA Corporation
Jun 19, 2024

The quantum computing reality is drawing nearer — Y2Q, Quantum Day, Q-Day — when quantum computers will be able to break the public-key cryptography that currently safeguards most of the internet and the…

Read more


Cryptographic Management: How to Minimize Mayhem and Maximize Effectiveness

Paul Lucier
Jul 27, 2021

Cryptography is the foundation of authentication, authorization, confidentiality, data integrity, and more. It is the foundation of digital trust; it is the enabler of overall enterprise security. Any…

Read more