Protecting confidential data for the future: Whitepaper explains post-quantum cryptography

Do you know lattice-based cryptographic methods? Or multivariate signatures? If not, then you should look into them, because these and a few other methods are currently on the rise. They belong to the so-called "post-quantum cryptography". This term covers those...

Atos strengthens its cybersecurity offering thanks to the acquisition of German cryptography specialist cryptovision

Atos strengthens its cybersecurity offering thanks to the acquisition of German cryptography specialist cryptovision

Chiasmus replacement with GreenShield: VS-NfD approval now also for password-based file encryption

Handling VS-NfD classified information becomes much more convenient if you can encrypt it as a file or send it securely by e-mail. However, government agencies and companies may only use products with government VS-NfD approval for this purpose. GreenShield from...

Hafnium authority hack shows once again: end-to-end encryption is indispensable

Once again, a security incident has the IT world in a tizzy. This time it is several security holes in the widely used mail server Microsoft Exchange that have triggered the disaster. In Germany alone, at least 10,000 Exchange servers were initially affected. Through...