5 min read
Crypto-Agility in the Advent of Post Quantum Computing
There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
5 min read
There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...
2 min read
Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...
2 min read
Maybe you have wondered where our logo comes from and what it actually means. If you have, we hope the following will answer these questions. Just as...
2 min read
The European Union is leading the way in the move towards the creation of a single digital market. There are many advantages a digital business has...
6 min read
With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...
2 min read
Microsoft’s Azure Key Vault Managed HSM allows customers to safeguard their cryptographic keys for their cloud applications and be...
3 min read
This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for...
2 min read
A number of serious security vulnerabilities, collectively known under the names of “Meltdown” and “Spectre” [1][2], have recently been discovered in...
3 min read
The European Interoperability Framework (EIF) adopted in 2017 is the primary thrust in the EU’s effort to improve the efficiency of public service...