Insights on Cryptography, Quantum Readiness, and Security Strategy
Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.
Tags:
A Q&A with Atsushi Yamada: PQC, Addressing Risk Management Needs, What’s Ahead
Mirko Zorz, director of content with Help Net Security, interviewed Atsushi Yamada, CEO of ISARA, to discuss the threat of cryptographically relevant quantum computers (CRQCs) and what’s ahead for the company.
A Discussion on Hybrid Certificates: A Foundation for Post-Quantum Migrations
Atsushi Yamada recently joined Sectigo’s Tim Callan, Chief Experience Officer, and Jason Soroko, SVP of Product, on the Root Causes: PKI & Security podcast, to discuss the role of hybrid certificates in post-quantum cryptography (PQC) and ongoing crypto agility.
A Recap of the 9th ETSI/IQC Quantum Safe Workshop
The ETSI/IQC Quantum Safe Workshop returned last week after a one year hiatus, held in-person at ETSI’s headquarters in the beautiful South of France. Regarded by many as the world’s premier event in quantum-safe security, the Workshop yet again brought together a diverse blend of talent, experience,…
Quantum Computing Explained: Latest X9 Report Now Available
The latest resource on quantum computing is now available, prepared by the Accredited Standards Committee (ASC) X9 Inc. Quantum Computing Risks to the Financial Services Industry provides background on the principles of quantum computing, the current state of quantum computing as it pertains to the financial…
Four Quantum-Safe Migration Recommendations from ICMC22
This year’s International Cryptographic Module Conference, held in Arlington, V.A., USA, brought together global leaders in commercial cryptography. It was great to see some old faces, make new acquaintances, and put faces to the voices we have been chatting with online over the past few years.
From Research to Action
Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.
Every Environment Is Different
If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.