Itan Barmes (Deloitte) - We need to Face the Quantum Risk Now!

Itan Barnes is part of Deloitte's cyber risk services team which helps companies to mitigate the quantum risk. Itan emphasizes the urgency of preparing company and infrastructure.

Read more

Michele Mosca (University of Waterloo) - Ramping Up The PQC Transition Process with Internal and External Stakeholders

Michele Mosca (University of Waterloo / evolutionQ) advises CIOs and CISOs on how to get prepared for the post quantum era. This requires defined people in charge and enough time to get all changes implemented.

Read more

Lily Chen (NIST) - Getting Prepared for the Migration towards PQC

Lily Chen (NIST) advises CIOs and CISOs to get prepared for the migration towards PQC soon. She breaks down the related challenges into 3 strategic aspects.

Read more

5th Applied Crypto Symposium in Silicon Valley - an Executive Summary

At the fifth edition of Utimaco's Applied Crypto Symposium, thought leaders from standardization organizations, global vendors,  consultancy firms and leading financial institutes discussed cyber security risks of post quantum computing and suitable solution scenarios.

Read more

NIST's Hybrid Mode Approach to Post-Quantum Computing - why crypto agility is crucial

With the advent of information security, the importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.

Read more

Why is the choice of the right HSM prerequisite for a crypto agile architecture

The time has come for all organizations to put serious consideration into the future of cryptography. The evolution of technology across the spectrum has brought us to the precipice of the next great technological shift. This is why the choice of the right Hardware Security Module (HSM) is a prerequisite for a crypto-agile architecture.

Read more

State of Symmetric & Hash Algorithms after Quantum Computing

The recent trends in information technology and communications have emerged as one of the main technological pillars of the modern age. The importance of cryptography has gained importance due to the requirement of security services (confidentiality, integrity, authenticity, and non-repudiation) in data storage/transmission.

Read more

Making Blockchain Technology Secure and Auditable

Modern society and commerce are based on trust and digital identities. Companies and organizations build a reputation for being trustworthy. Consequently, the trust in their products is based on the trust in the organization.

Read more

Crypto agility - How to determine your timeline for post-quantum preparation

There is a significant uncertainty when it comes to the impact of quantum computing on modern cryptography. Perhaps the largest concern centers on just exactly when the quantum cryptography apocalypse will occur. While there are flurries of activity surrounding both the development of stable quantum computers and the cryptography algorithms that can withstand them, many are operating on what is at best a "loose" timeline. To help you on your journey to crypto-agility, let's take a look into how to determine your timeline for post-quantum preparation.

Read more

Ready to take off?

Download our HSM simulator!

Register for free