Edlyn Teske

Edlyn has a distinguished career as a Professor of Mathematics at the Department of Combinatorics and Optimization and the Centre for Applied Cryptographic Research, University of Waterloo (Canada), until she moved to the San Francisco Bay Area, where she worked as Senior Solutions Architect at Cryptomathic and taught German at the GISSV Saturday School. Edlyn currently lives in Leipzig, Germany, working as Senior Cryptography Consultant at Cryptomathic. She is also busy mother of four children ages 11 to 20.

7 min read

Exploring DORA

Cryptomathic solutions support your financial institution towards compliance. The financial sector is increasingly dependent on technology and on...

Read More

2 min read

NIS2 succeeds NISD, and can now affect you too

Cryptomathic guides you towards compliance. EU Directive 2022/2555 on Network and Information Systems, also known as NIS2, entered into force on Jan...

Read More

1 min read

Secure-by-design key management for risk remediation against Storm-0558 type attacks

Over the course of a month in May/June 2023, hundreds of thousands of emails belonging to Microsoft customers were exposed to a hacker labelled...

Read More

2 min read

eIDAS 2.0 – What’s New?

The European eIDAS regulation, short for the Electronic IDentification, Authentication and Trust Services Regulation, was created in 2014 to ensure...

Read More

2 min read

More Post-Quantum Digital Signature Candidates!

On July 17, 2023, the National Institute of Standards and Technology (NIST) announced a new set of 40 candidates to compete in their Post-Quantum...

Read More

2 min read

The European Digital Identity Wallet as a Means of Authentication

The European Commission, as part of the eIDAS 2.0 proposal promotes the European Digital Identity Wallet (EUDI Wallet) as an app that enables...

Read More

6 min read

Resources to Help You Develop and Test EUDI Wallet App Security

Itemizing the potential risks of the European Digital Identity (EUDl) Wallet scheme is a complex task that involves assessing the attack surface of...

Read More

5 min read

What is an Assurance Protocol in Mobile App Security?

Mobile apps and mobile software components are rarely stand-alone as they frequently perform their most important operations on various backend...

Read More

5 min read

Protecting the European Digital Identity Wallet

The European Commission promotes the European Digital Identity wallet (EUDI wallet) as part of its effort to digitize the economy and help foster...

Read More