ISARA Insights Blog
Featured Blog Post
Cybersecurity in the Age of Quantum Computing: A Cryptographer’s Call to Action
ISARA Corporation & Accenture Federal Services
Dec 08, 2025
Computing power has advanced far beyond the invention of the transistor. Today’s digital infrastructures rely on public-key cryptography to safeguard commerce, state secrets and personal privacy. But a new paradigm is within our view. Quantum computers utilize superposition and entanglement to perform computations that are infeasible for classical machines.
Tags:
Cryptography and the Quantum Threat: The Sky is Not Falling
Paul Lucier
Feb 24, 2022
You remember Henny Penny, the iconic children’s folktale that’s been told and retold in different ways, across many countries since the early 1800s? Henny Penny (the hen) gets hit on the head with an acorn…
Your Post-Quantum Cryptography Journey: Over the River and Through the Woods
Paul Lucier
Dec 08, 2021
‘Tis the season for visits to grandmother and Uncle Joe. ‘Tis also the season for organizations to start planning their roadmaps for a quantum-safe New Year. After all, the third round of the NIST PQC…
Taking Charge of Crypto
Paul Lucier
Oct 13, 2021
Cryptography is everywhere — at the core of every secure transaction, every safe automobile, every form of communication. That’s why cryptographic management is oh-so-critical, yet sometimes challenging…
Cryptographic Management: How to Minimize Mayhem and Maximize Effectiveness
Paul Lucier
Jul 27, 2021
Cryptography is the foundation of authentication, authorization, confidentiality, data integrity, and more. It is the foundation of digital trust; it is the enabler of overall enterprise security. Any…
How to Manage Your Cryptographic “Garden”
Paul Lucier
Jul 13, 2021
For gardeners, summer is the growing season. As any gardener knows, a successful garden requires work throughout the year. In the autumn, you tidy up last year’s scraggly plants and you mulch. In the winter,…