
Securing systems with post-quantum cryptography
The race to quantum supremacy is advancing to real-life applications. But how can we guarantee security against something that hasn’t been fully developed?
With data security top of mind for business and government, new technology is developing ever more complex cryptographic algorithms to protect users
The race to quantum supremacy is advancing to real-life applications. But how can we guarantee security against something that hasn’t been fully developed?
As central banks explore the role a digital currency can play, it’s important to understand what an optimal CBDC solution would look like
What does the digitalization of documents mean for the consumer when it comes to security, storage, and ownership of personal data on mobile devices?
The Covid-19 pandemic has reinvigorated the need for eGovernment ecosystems. Citizens can have access to digital services safely and securely throughout their lives
Why new voting ID cards in Mexico are one of the most secure documents in Latin America, supporting not only democracy but also the environment
Faced with the shocking statistics around malicious threats, organizations need to take a zero-trust approach to infrastructure defense
Independent digital payment which complements cash is essential for public freedom. Dr. Wolfram Seidemann, CEO of G+D Currency Technology, explains
Are your cryptographic systems ready for quantum computing? The answer is certainly no. But cryptographers are working on changing that
How secure is your hardware? System security begins and ends with RoT, providing a solid foundation for all secure operations of a computing system