Johannes “Jo” Lintzen

Johannes “Jo” Lintzen

With more than 15 years of experience in the data security industry, Johannes “Jo” Lintzen currently works with clients in North America helping them to solve their encryption and key management puzzles. In his role as EVP for Cryptomathic Inc., Jo is driving Sales and Business Development initiatives to develop a strong partner base in the region. Jo joined Cryptomathic in 2017, after spending 10 years with a focus on integrations of cryptographic hardware (HSMs) into large distributed systems for the Energy, Automotive and Financial industries. In his spare time, you will find him outdoors spending quality time with his family (and the dog).
Good key management for financial services: protecting your digital assets from the inside out

Good key management for financial services: protecting your digital assets from the inside out

Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside vendors for effective cybersecurity. The financial services industry must evolve its encryption and key management strategies in line with its changing infrastructure models, advocating an inside-out approach that has proven itself over time.

Crypto-Agility: The gold at the end of the Rainbow for NIST PQC Standardization

Crypto-Agility: The gold at the end of the Rainbow for NIST PQC Standardization

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for post-quantum cryptography standards and the importance of future-proofing how we use cryptography to protect data in the advent of quantum computing and beyond.

Q&A on Quantum Computing and Cryptography: The Risks Posed and how Crypto-Agility can Help Prepare for it

Q&A on Quantum Computing and Cryptography: The Risks Posed and how Crypto-Agility can Help Prepare for it

While the science and technology behind quantum computers is extremely complex, their computing power has been steadily increasing, from 3 qubits in 1998, to 7 qubits in 2000, to 12 qubits in 2006, and up to 72 qubits in 2018.

Achieving Software Integrity Through Centralized Code Signing

Achieving Software Integrity Through Centralized Code Signing

The phrase “…Software is eating the world.” was famously used by Marc Andreessen in a WSJ article in 2011. It is now 2020, and one could argue that software has successfully eaten the world.

Key Management in a Multi-Cloud Environment - A blessing or a curse?

Key Management in a Multi-Cloud Environment - A blessing or a curse?

Most people will probably agree that encrypting your sensitive data is the right thing to do. Not only is it the technique of choice to meet multiple compliance mandates, depending on the market your business operates in, this might be PCI, HIPAA, NERC-CIP or more general regulations like GDPR or PSD2. Encryption also helps you to achieve a higher level of resilience against data breaches and ultimately protects your organization from the impacts on reputation and the costs involved.