ISARA Insights Blog
Featured Blog Post
Cybersecurity in the Age of Quantum Computing: A Cryptographer’s Call to Action
ISARA Corporation & Accenture Federal Services
Dec 08, 2025
Computing power has advanced far beyond the invention of the transistor. Today’s digital infrastructures rely on public-key cryptography to safeguard commerce, state secrets and personal privacy. But a new paradigm is within our view. Quantum computers utilize superposition and entanglement to perform computations that are infeasible for classical machines.
Tags:
How to Start Readying Your IT Ecosystem for Quantum Now
Alex Truskovsky
Jun 16, 2020
Quantum computers will deliver tremendous benefits, but they will also be able to break the cryptography underlying public key infrastructure (PKI). Quantum computing will be able to solve very specific…
Transforming PKI Migrations: Unlocking the Power of Crypto-Agility with Quantum-Safe Multiple Algorithm Certificates
Alex Truskovsky
Apr 12, 2018
Crypto-agility is the key to cost-effectively migrate information and communication technology (ICT) systems from legacy to quantum-safe systems. By using our unique dual algorithm approach to certificates,…
ISARA Radiate™ Security Solution Suite 1.4 Brings XMSS to Complete its Offering of Stateful Hash-Based Signatures for Quantum-Safe Roots of Trust
Alex Truskovsky
Mar 27, 2018
With the latest release of the ISARA Radiate™ Security Solution Suite, we’ve added stateful hash-based signatures, specifically eXtended Merkle Signature Scheme (XMSS), to the cryptographic library. With…
Do You Know About Quantum’s Threat to OTA Software Updates?
Alex Truskovsky
Oct 17, 2017
Today, remotely updating a device’s software - such as a connected car or smartphone - is easy and cost-effective. There’s no need to physically return the device to the manufacturer, which happily saves…