ISARA Insights Blog

Dec 08, 2025

Cybersecurity in the Age of Quantum Computing: A Cryptographer’s Call to Action

Computing power has advanced far beyond the invention of the transistor. Today’s digital infrastructures rely on public-key cryptography to safeguard commerce, state secrets and personal privacy. But a new paradigm is within our view. Quantum computers utilize superposition and entanglement to perform…

ISARA Corporation & Accenture Federal Services

Learn More


Dec 19, 2017

Quantum Computing: Its Emergence & Implications on Information Security

Leading governments around the globe, along with major corporations, including IBM, Google, Microsoft, have all made substantial investments in the development of large-scale quantum computers, just in the past decade. There's a reason for this prescient obsession. What exactly is quantum computing?  Quantum…

Mark Pecen

Learn More

Nov 08, 2017

Next-Generation Cryptographic Certificates: Toward Quantum-Safe Identity

Cryptographic certificates are used to prove a person’s, system’s, company’s or other entity’s identity. Today, cryptographic certificates are based on public-key cryptography, which is vulnerable to quantum computer-enabled adversaries. Learn more about protecting digital identities in this blog post…

Mark Pecen

Learn More