Insights on Cryptography, Quantum Readiness, and Security Strategy

Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.

Blog resources illustration
Tags:
Jan 17, 2020

Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat

The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI and effects the way Elliptic Curve Cryptography (ECC) x.509 certificates are validated, giving…

Mike Brown

Learn More

Nov 12, 2019

Take the First Steps To Quantum-Safe Security Now to Avoid Mistakes Later

The following is an excerpt from a contributed opinion piece on Next Gov by Scott Totzke, CEO & Co-founder of ISARA Corporation. No enterprise—whether a government, a military or a private company—can afford to be unprepared.

Scott Totzke

Learn More

Oct 02, 2019

Quantum-Safe Cryptography: The Time to Prepare Is Now

The following is an excerpt from a contributed opinion piece on DARK Reading by Scott Totzke, CEO & Co-founder of ISARA Corporation. Quantum computing is real and it's evolving fast. Is the security industry up to the challenge?

Scott Totzke

Learn More

Jul 23, 2019

Myth-Busting the Quantum Threat: The Top 3 Misconceptions About Quantum-Safe Migrations

Part of our mission at ISARA is to educate and raise awareness of the security risks introduced by large-scale quantum computing. Since I joined ISARA in 2016, I’ve spoken to individuals, enterprises, and governments around the world, and along the way, I’ve heard some incorrect assumptions about the…

Paul Lucier

Learn More

Jul 02, 2019

Top 3 Noteworthy Advances in the Quantum-safe Security Market

Awareness is spreading about the threat that large-scale quantum computing poses to current public key cryptography, and both nation-states and security professionals are taking note.

Paul Lucier

Learn More

From Research to Action

Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.

Every Environment Is Different

If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.