ISARA Insights Blog
Featured Blog Post
Cybersecurity in the Age of Quantum Computing: A Cryptographer’s Call to Action
ISARA Corporation & Accenture Federal Services
Dec 08, 2025
Computing power has advanced far beyond the invention of the transistor. Today’s digital infrastructures rely on public-key cryptography to safeguard commerce, state secrets and personal privacy. But a new paradigm is within our view. Quantum computers utilize superposition and entanglement to perform computations that are infeasible for classical machines.
Tags:
Mastering the Quantum Challenge for Machine Identities
Mike Brown
Nov 11, 2020
It is no secret that cybersecurity threats are ever-evolving. Each day, security professionals around the world receive reports of new vulnerabilities, new attack vectors, and new challenges that need…
Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat
Mike Brown
Jan 17, 2020
The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI…
How Quantum Computing’s Threat to Security is Different from All Other Security Breaches
Mike Brown
Jan 11, 2018
The quantum threat represents the first time in history that a cybersecurity breach will be the result of a complete break of modern public-key cryptography. For many, this information might come as a…