Blog

Post quantum crypto agility

 digital pattern
Blog

Understanding and planning for a post-quantum security ecosystem

Although we cannot predict exactly when digital crime will become a threat, we can realistically expect that the majority of companies will have at least five years to prepare.
Itan Barmes (Deloitte) - We need to Face the Quantum Risk Now!
Blog

Itan Barmes (Deloitte) - We need to Face the Quantum Risk Now! - Utimaco

Itan Barmes, a cybersecurity expert at Deloitte, points out that most companies have not prepared their security infrastructure, algorithms and HSMs for the post-quantum era.
Michele Mosca (University of Waterloo) - Ramping Up The PQC Transition Process with Internal and External Stakeholders
Blog

Michele Mosca (University of Warerloo) - Ramping Up The PQC Transition Process with Internal and External Stakeholders

Michele Mosca - Ramping Up the PQC Transition Process with Internal and External Stakeholders. CIOs and CISOs need to know how to get prepared for the post quantum era.
Lily Chen (NIST) - Getting Prepared for the Migration towards PQC
Blog

Lily Chen (NIST) - Getting Prepared for the Migration towards PQC

Lily Chen (NIST), the manager of the Crypto Technology Group at NIST, advises CIOs and CISOs to get prepared for the migration towards PQC soon.
Michael Engel (Diebold-Nixdorf) - Encrypting Retail Banking Services for End-to-End Security (video)
Blog

Michael Engel (Diebold-Nixdorf) - Encrypting Retail Banking Services for End-to-End Security (video)

In this video, Michael Engel explains, why he is partners with Utimaco for that critical element of encryption technology in the financial services across the globe.
blog-5th-applied-crypto-symposium-silicon-valley
Blog

5th Applied Crypto Symposium in Silicon Valley - an Executive Summary

At the 5th Applied Crypto Symposium in Silicon Valley, thought leaders from standardization organizations, global vendors,  consultancy firms & leading financial institutes discussed cyber security risks of post quantum computing.
blog-nists-hybrid-mode-approach-to-post-quantum-computing
Blog

NIST's Hybrid Mode Approach to Post-Quantum Computing - why crypto agility is crucial

The importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.
Puzzle piece missing
Blog

Why is the choice of the right HSM prerequisite for a crypto agile architecture

Organizations have to put serious consideration into the future of cryptography. This is why the choice of the right Hardware Security Module is a prerequisite for a crypto-agile architecture.
blog-state-of-symmetric-hash-algorithms-after-quantum-computing
Blog

State of Symmetric & Hash Algorithms after Quantum Computing

The importance of cryptography is increasing. The formalization of quantum computing platforms poses serious threats to the cryptographic algorithms. Be informed about the omplications of quantum computing on the present cryptography.
blog-making-blockchain-technology-secure-and-auditable
Blog

Making Blockchain Technology Secure and Auditable

Modern blockchain technology is evolving. The transfer of trusted data to the blockchain technology makes it essential for blockchains to be implemented in a secure manner.
blog-trends-and-observations-from-rsa-2019
Blog

Trends and observations from RSA Conference San Francisco 2019

Utimaco attended the RSA Conference in 2019 and we made some observations regarding the changes that are expected in the cyber-security industry.
blog-crypto-agility
Blog

Crypto agility - How to determine your timeline for post-quantum preparation

There is a significant uncertainty when it comes to the impact of quantum computing on modern cryptography. Michele Mosca has offered a theorem that may be the key to successfully determining your path to post-quantum preparation.