Johannes “Jo” Lintzen

With more than 15 years of experience in the data security industry, Johannes “Jo” Lintzen currently works with clients in North America helping them to solve their encryption and key management puzzles. In his role as EVP for Cryptomathic Inc., Jo is driving Sales and Business Development initiatives to develop a strong partner base in the region. Jo joined Cryptomathic in 2017, after spending 10 years with a focus on integrations of cryptographic hardware (HSMs) into large distributed systems for the Energy, Automotive and Financial industries. In his spare time, you will find him outdoors spending quality time with his family (and the dog).

organizations are getting ready for the quantum security era

4 min read

PQC and How Organizations are Preparing for the Quantum Security Era

Quantum computers offer potential transformational power for organizations dealing with complex computational problems in various industries such as...

Read More
NIST Seeks Public Feedback to Draft Guide on Migration to Post-Quantum Cryptography

2 min read

NIST Seeks Public Feedback to Draft Guide on Migration to PQC

The National Cybersecurity Center of Excellence (NCCoE) has released a preliminary guide on practices for migrating from legacy cryptography to...

Read More

3 min read

Cloud Adoption Opportunities & Challenges in the Financial Sector

The recent U.S. Department of the Treasury report highlights potential benefits and challenges associated with a growing trend amongst financial...

Read More
PQC and crypto agility

2 min read

Preparing For Post-Quantum Cryptography In 10 Steps

With post-quantum technology having the potential to trigger a new wave of cyber threats, we identify 10 steps that organizations should take to...

Read More

3 min read

Why 2023 is the year to become PQC-ready

2022 was a big year in the cryptographic security community. If you don’t have news alerts set up for the latest updates on Post-Quantum Cryptography...

Read More
Good key management for financial services: protecting your digital assets from the inside out

3 min read

Key Management in FS: Protecting Your Digital Assets, Inside and Out

Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside...

Read More
Crypto-Agility: The Real Gold (Standard) at the End of the Rainbow

3 min read

Crypto-agility: The Gold at the End of the Rainbow for NIST PQC

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...

Read More
Code-signing-cryptomathic

3 min read

Achieving Software Integrity Through Centralized Code Signing

The phrase “…Software is eating the world.” was famously used by Marc Andreessen in a WSJ article in 2011. No one could argue that software has...

Read More
Key-Management-in-a-Multi-Cloud-Environment-cryptomathic

3 min read

Key Management in a Multi-Cloud Environment - A blessing or a curse?

Most people will probably agree that encrypting your sensitive data is the right thing to do. Not only is it the technique of choice to meet multiple...

Read More