News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Algorithms for post-quantum cryptography
Algorithms for post-quantum cryptography

An IT security solutions provider introduces Quantum Protect, a post-quantum cryptography application suite for its u.trust General Purpose HSM Se series hardware security modules (HSMs). The emergence of quantum computers poses a threat to today's cryptographic systems. By 2030, cryptanalytically relevant quantum computers could be available that could break common public key algorithms such as RSA or ECC. This date may seem far away, but companies must begin planning for the transition to post-quantum cryptography (PQC) now to remain secure in the future. Last year, the U.S. National Institute of…

Read more

NIS2 Directive: How companies are meeting the challenge
NIS2 Directive: How companies are meeting the challenge

The NIS2 Directive tightens the requirements for corporate cybersecurity. This leads to high investments in security solutions and employee training for companies with critical infrastructures. Read about which measures are important and how you can overcome the challenges. The NIS2 Directive, which is expected to be anchored in national law in Germany from spring 2025, aims to establish a higher level of security in the EU and to better protect companies in important infrastructure areas from cyberattacks. According to studies, however, only around a third of the approximately 30.000 companies affected in this country are on the...

Read more

SMEs: Four tips for more cybersecurity
SMEs: Four tips for more cybersecurity

More and more SMEs are falling victim to cyber attacks. But it is precisely these companies that often lack the resources to take effective preventive measures and keep their own systems up to date. In the years 2018 to 2020 alone, almost 30 percent of German SMEs fell victim to cybercrime, according to an analysis by KfW. This is therefore a concrete threat that can lead to enormous business damage. At the same time, EU-wide regulations such as NIS-2 and DORA stipulate that managers in certain industries can also be held personally liable for IT security breaches, which...

Read more

File encryption protects critical data
File encryption protects critical data

Ransomware attacks are currently the number 1 threat in cyberspace for companies. That's why protecting sensitive and business-critical data is becoming increasingly important. A file encryption solution can help with this. With u.trust LAN Crypt Cloud, Utimaco presents a new, easy-to-use as-a-service solution to protect sensitive and business-critical data from unauthorized access. Client-side encryption ensures that data remains protected regardless of where it is stored - whether on premises or in the cloud. Ransomware attacks on over 70 percent of companies According to recent publications from Europol and Statista, ransomware attacks continue to…

Read more

Secure data in production
Secure data in production

IT and OT are merging more and more, with the effect that production environments can also be directly affected by cyber attacks. A particularly drastic example occurred last year when hackers paralyzed Toyota's entire production facility. Nils Gerhardt, Chief Technology Officer, from Utimaco shows five principles that companies should observe in order to secure their production in the best possible way. Encrypt sensitive data Software-based data and folder encryption ensures that, if in doubt, criminals cannot do anything with stolen data. This means that trade secrets are protected even if a company falls victim to a hacker attack. Effective…

Read more

Invest in post-quantum cryptography
B2B Cyber ​​Security ShortNews

Google is already using a quantum-safe encryption process (post-quantum cryptography) in its latest version of the Chrome browser. Companies should do the same. The quantum-safe key encapsulation process in the Chrome browser protects the exchange of symmetric keys when establishing secure TLS connections. Is this step necessary even though practical use of quantum computers is not yet foreseeable in the near future? Yes, says Nils Gerhardt, CTO at Utimaco. Preparing for the future “In fact, we cannot yet say when practical use of quantum computers can be expected or when criminals will have access to them. But…

Read more

Post-quantum cryptography: encryption against quantum computers
Post-quantum cryptography: encryption against quantum computers

Algorithms used today for encryption may soon prove too weak - once quantum computers become practical. Algorithms and hardware must therefore be developed that can also withstand these powerful supercomputers: post-quantum cryptography. A few years ago, the US federal agency National Institute of Standards and Technology (NIST) initiated a process to define/evaluate quantum-resistant algorithms. The potential candidates were selected in various rounds. In total, more than 80 algorithms were proposed, some of which were dropped quite early. The reason for this was that mathematical attacks were developed for quantum computers that break the algorithms...

Read more