Insights on Cryptography, Quantum Readiness, and Security Strategy
Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.
Tags:
What Canada’s innovation investment in ISARA means for new, foundational cybersecurity technologies
Our team at ISARA is proud to be have been awarded further funds for our research and development of quantum-safe cryptography and agile technologies. ISARA is one of three organizations that received government funding on April 18 through the Strategic Innovation Fund, a program that supports transformational…
5 Ways Quantum Computing Will Change the World
In the days after I resigned from my position as the senior manager of scientific outreach at the Institute for Quantum Computing to join ISARA Corporation, one esteemed colleague after another would offer me a farewell handshake and say, half jokingly, “So, you’ve finally decided to join the dark side?”…
The Georgian Impact Podcast: "Quantum Computing and Tomorrow's Problems Today"
Quantum technologies are still in the early stages of development. Large-scale quantum computers capable of breaking the security of today’s online communications are predicted to be eight to ten years away. So, why is your data already at risk?
International Women’s Day 2019: Jacquelyn Parker created her own path, with tenacity and by trusting her instincts
Jacquelyn Parker, ISARA’s Vice President of Operations, has always carved out her own path, both professionally and personally. When others told her something couldn’t be done, she found a way. Her tenacity and love of lifelong learning have taken her down many paths in her career, culminating in a highly…
NIST Round Two: One Step Closer to Standardization
Best practices for cryptography evolve with time, and staying secure sometimes requires immediate reaction. The transition to Elliptic Curve Cryptography specified by the US National Security Agency's 2005 "Suite B" recommendation included a comfortable transition period. However, in August 2015, the…
From Research to Action
Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.
Every Environment Is Different
If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.