Johannes “Jo” Lintzen

Johannes “Jo” Lintzen

With more than 15 years of experience in the data security industry, Johannes “Jo” Lintzen currently works with clients in North America helping them to solve their encryption and key management puzzles. In his role as EVP for Cryptomathic Inc., Jo is driving Sales and Business Development initiatives to develop a strong partner base in the region. Jo joined Cryptomathic in 2017, after spending 10 years with a focus on integrations of cryptographic hardware (HSMs) into large distributed systems for the Energy, Automotive and Financial industries. In his spare time, you will find him outdoors spending quality time with his family (and the dog).
PQC and How Organizations are Preparing for the Quantum Security Era

PQC and How Organizations are Preparing for the Quantum Security Era

Quantum computers offer potential transformational power for organizations dealing with complex computational problems in various industries such as finance, pharmaceuticals, and automotive. They also pose the risk of breaking the cryptography that currently secures many common digital activities, such as online banking or something as common as browsing the internet (Yes, that green lock in your address bar means you can trust the connection – for now).

NIST Seeks Public Feedback to Draft Guide on Migration to Post-Quantum Cryptography

NIST Seeks Public Feedback to Draft Guide on Migration to Post-Quantum Cryptography

The National Cybersecurity Center of Excellence (NCCoE) has released a preliminary guide on practices for migrating from legacy cryptography to quantum-resistant cryptography and is seeking comments from industry, government, and academia. The draft document, NIST Special Publication (SP) 1800-38a, Migration to Post-Quantum Cryptography, is open for comment until June 8, 2023.

US Treasury Report Assesses Opportunities and Challenges Facing Financial Sector's Cloud-Based Technology Adoption

US Treasury Report Assesses Opportunities and Challenges Facing Financial Sector's Cloud-Based Technology Adoption

The recent U.S. Department of the Treasury report highlights potential benefits and challenges associated with a growing trend amongst financial sector firms who are adopting cloud services.

Preparing For Post-Quantum Cryptography In 10 Steps

Preparing For Post-Quantum Cryptography In 10 Steps

With post-quantum technology having the potential to trigger a new wave of cyber threats, we identify 10 steps that organizations should take to prepare.

Why 2023 is the year to become PQC-ready

Why 2023 is the year to become PQC-ready

2022 was a big year in the cryptographic security community. If you don’t have news alerts set up for the latest updates on Post-Quantum Cryptography (PQC), here’s a quick overview

Good key management for financial services: protecting your digital assets from the inside out

Good key management for financial services: protecting your digital assets from the inside out

Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside vendors for effective cybersecurity. The financial services industry must evolve its encryption and key management strategies in line with its changing infrastructure models, advocating an inside-out approach that has proven itself over time.

Crypto-Agility: The gold at the end of the Rainbow for NIST PQC Standardization

Crypto-Agility: The gold at the end of the Rainbow for NIST PQC Standardization

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for post-quantum cryptography standards and the importance of future-proofing how we use cryptography to protect data in the advent of quantum computing and beyond.

Achieving Software Integrity Through Centralized Code Signing

Achieving Software Integrity Through Centralized Code Signing

The phrase “…Software is eating the world.” was famously used by Marc Andreessen in a WSJ article in 2011.  No one could argue that software has successfully eaten the world today.

Key Management in a Multi-Cloud Environment - A blessing or a curse?

Key Management in a Multi-Cloud Environment - A blessing or a curse?

Most people will probably agree that encrypting your sensitive data is the right thing to do. Not only is it the technique of choice to meet multiple compliance mandates, depending on the market your business operates in, this might be PCI, HIPAA, NERC-CIP or more general regulations like GDPR or PSD2. Encryption also helps you to achieve a higher level of resilience against data breaches and ultimately protects your organization from the impacts on reputation and the costs involved.