ISARA Insights Blog

Featured Blog Post

Cybersecurity in the Age of Quantum Computing: A Cryptographer’s Call to Action

ISARA Corporation & Accenture Federal Services
Oct 31, 2025

Computing power has advanced far beyond the invention of the transistor. Today’s digital infrastructures rely on public-key cryptography to safeguard commerce, state secrets and personal privacy. But a new paradigm is within our view. Quantum computers utilize superposition and entanglement to perform computations that are infeasible for classical machines.

Read more


Quantum Computing: Its Emergence & Implications on Information Security

Mark Pecen
Dec 19, 2017

Leading governments around the globe, along with major corporations, including IBM, Google, Microsoft, have all made substantial investments in the development of large-scale quantum computers, just in…

Read more


Next-Generation Cryptographic Certificates: Toward Quantum-Safe Identity

Mark Pecen
Nov 08, 2017

Cryptographic certificates are used to prove a person’s, system’s, company’s or other entity’s identity. Today, cryptographic certificates are based on public-key cryptography, which is vulnerable to quantum…

Read more