Insights on Cryptography, Quantum Readiness, and Security Strategy
Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.
Tags:
Quantum Key Distribution and Quantum-Safe Cryptography: two (complementary) approaches to becoming quantum-ready
Every advancement in quantum computing brings us closer to the positive and negative disruptions this revolutionary technology promises. Though a large-scale quantum computer is not here yet, its future arrival already puts many aspects of information security at risk today because of “harvest-and-decrypt”…
We’re on a mission to create a quantum-safe world
On November 19th, we announced the exciting news that we raised $10 million USD in Series A funding led by Shasta Ventures. This is in addition to an initial capital investment of $11.5 million USD from Quantum Valley Investments. Subsequently, I’d like to officially welcome Nitin Chopra, Partner at…
The PKI Guy talks quantum-safe security with Alexander Truskovsky
Our Senior Product Manager, Alexander Truskovsky, sat down with Mark B. Cooper of PKI Solutions Inc (A.K.A The PKI Guy) to discuss quantum-safe security, which was released August 1st, 2018.
Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography
One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using quantum computers. Isogeny-based cryptography offers the closest quantum-safe cryptographic primitives…
Why are Washington lawmakers suddenly so interested in quantum tech?
Blockchain. Artificial intelligence. Machine learning. These have all become buzzwords in Washington as lawmakers hear about how these promising technologies are expected to benefit the American public and private sectors alike. The United States’ Congress has sought to understand how these emerging…
From Research to Action
Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.
Every Environment Is Different
If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.