4 min read
PQC and How Organizations are Preparing for the Quantum Security Era
Quantum computers offer potential transformational power for organizations dealing with complex computational problems in various industries such as...
With more than 15 years of experience in the data security industry, Johannes “Jo” Lintzen currently works with clients in North America helping them to solve their encryption and key management puzzles. In his role as EVP for Cryptomathic Inc., Jo is driving Sales and Business Development initiatives to develop a strong partner base in the region. Jo joined Cryptomathic in 2017, after spending 10 years with a focus on integrations of cryptographic hardware (HSMs) into large distributed systems for the Energy, Automotive and Financial industries. In his spare time, you will find him outdoors spending quality time with his family (and the dog).
4 min read
Quantum computers offer potential transformational power for organizations dealing with complex computational problems in various industries such as...
2 min read
The National Cybersecurity Center of Excellence (NCCoE) has released a preliminary guide on practices for migrating from legacy cryptography to...
3 min read
The recent U.S. Department of the Treasury report highlights potential benefits and challenges associated with a growing trend amongst financial...
2 min read
With post-quantum technology having the potential to trigger a new wave of cyber threats, we identify 10 steps that organizations should take to...
3 min read
2022 was a big year in the cryptographic security community. If you don’t have news alerts set up for the latest updates on Post-Quantum Cryptography...
3 min read
Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside...
3 min read
Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...
3 min read
Most people will probably agree that encrypting your sensitive data is the right thing to do. Not only is it the technique of choice to meet multiple...
5 min read
While the science and technology behind quantum computers is extremely complex, their computing power has been steadily increasing, from 3 qubits in...