Insights on Cryptography, Quantum Readiness, and Security Strategy

Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.

Blog resources illustration
Tags:
Apr 25, 2019

What Canada’s innovation investment in ISARA means for new, foundational cybersecurity technologies

Our team at ISARA is proud to be have been awarded further funds for our research and development of quantum-safe cryptography and agile technologies. ISARA is one of three organizations that received government funding on April 18 through the Strategic Innovation Fund, a program that supports transformational…

ISARA Corporation

Learn More

Apr 17, 2019

5 Ways Quantum Computing Will Change the World

In the days after I resigned from my position as the senior manager of scientific outreach at the Institute for Quantum Computing to join ISARA Corporation, one esteemed colleague after another would offer me a farewell handshake and say, half jokingly, “So, you’ve finally decided to join the dark side?”…

Martin Laforest

Learn More

Mar 26, 2019

The Georgian Impact Podcast: "Quantum Computing and Tomorrow's Problems Today"

Quantum technologies are still in the early stages of development. Large-scale quantum computers capable of breaking the security of today’s online communications are predicted to be eight to ten years away. So, why is your data already at risk?

ISARA Corporation

Learn More

Mar 04, 2019

International Women’s Day 2019: Jacquelyn Parker created her own path, with tenacity and by trusting her instincts

Jacquelyn Parker, ISARA’s Vice President of Operations, has always carved out her own path, both professionally and personally. When others told her something couldn’t be done, she found a way. Her tenacity and love of lifelong learning have taken her down many paths in her career, culminating in a highly…

ISARA Corporation

Learn More

Feb 26, 2019

NIST Round Two: One Step Closer to Standardization

Best practices for cryptography evolve with time, and staying secure sometimes requires immediate reaction. The transition to Elliptic Curve Cryptography specified by the US National Security Agency's 2005 "Suite B" recommendation included a comfortable transition period. However, in August 2015, the…

Filip Pawlega

Learn More

From Research to Action

Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.

Every Environment Is Different

If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.