ISARA Insights Blog
Overcoming Challenges in Quantum Readiness: ISARA Webinar Recap
Feeling overwhelmed about where to start with quantum readiness? You’re not alone. According to ISACA, 55% of organizations have not taken any steps to prepare for the arrival of quantum computers — even though most organizations are worried that quantum will break today's encryption and create new business…
Tags:
Overcoming Challenges in Quantum Readiness: ISARA Webinar Recap
Feeling overwhelmed about where to start with quantum readiness? You’re not alone. According to ISACA, 55% of organizations have not taken any steps to prepare for the arrival of quantum computers — even though most organizations are worried that quantum will break today's encryption and create new business…
Beyond the CBOM Hype: Setting the Record Straight
Misconceptions. Myths. Hype. The conversation around Cryptography Bills of Materials (CBOMs) has gained significant traction, with some presenting them as a comprehensive solution for cryptographic agility, inventories, and quantum-safe transitions. While CBOMs have their merits, the expectations placed…
The ABCs of Harvest and Decrypt
As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged to start preparing for quantum-capable adversaries. And for several very good reasons. If you’re…
Quantum-Safe Standards Have Arrived
August 13, 2024. Post-Quantum Cryptography Day. Quantum-Safe Standards Day. Tuesday. Whatever you prefer to call it, it’s a historic day. Today, a critical milestone has been reached on the journey to a quantum-safe world. Today, the U.S. Department of Commerce, through the National Institute of Standards…
Plan Quantum-Safe Migrations Now to Avoid These 4 Pitfalls
The quantum computing reality is drawing nearer — Y2Q, Quantum Day, Q-Day — when quantum computers will be able to break the public-key cryptography that currently safeguards most of the internet and the critical applications we rely on. As a result, it is becoming increasingly urgent for organizations…