Featured Blog Post
ISARA Corporation & Accenture Federal Services
Oct 31, 2025
Computing power has advanced far beyond the invention of the transistor. Today’s digital infrastructures rely on public-key cryptography to safeguard commerce, state secrets and personal privacy. But a new paradigm is within our view. Quantum computers utilize superposition and entanglement to perform computations that are infeasible for classical machines.
Paul Lucier
Feb 24, 2022
You remember Henny Penny, the iconic children’s folktale that’s been told and retold in different ways, across many countries since the early 1800s? Henny Penny (the hen) gets hit on the head with an acorn…
Paul Lucier
Dec 08, 2021
‘Tis the season for visits to grandmother and Uncle Joe. ‘Tis also the season for organizations to start planning their roadmaps for a quantum-safe New Year. After all, the third round of the NIST PQC…
Paul Lucier
Oct 13, 2021
Cryptography is everywhere — at the core of every secure transaction, every safe automobile, every form of communication. That’s why cryptographic management is oh-so-critical, yet sometimes challenging…
Paul Lucier
Jul 27, 2021
Cryptography is the foundation of authentication, authorization, confidentiality, data integrity, and more. It is the foundation of digital trust; it is the enabler of overall enterprise security. Any…
Paul Lucier
Jul 13, 2021
For gardeners, summer is the growing season. As any gardener knows, a successful garden requires work throughout the year. In the autumn, you tidy up last year’s scraggly plants and you mulch. In the winter,…