News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

File encryption protects critical data
File encryption protects critical data

Ransomware attacks are currently the number 1 threat in cyberspace for companies. That's why protecting sensitive and business-critical data is becoming increasingly important. A file encryption solution can help with this. With u.trust LAN Crypt Cloud, Utimaco presents a new, easy-to-use as-a-service solution to protect sensitive and business-critical data from unauthorized access. Client-side encryption ensures that data remains protected regardless of where it is stored - whether on premises or in the cloud. Ransomware attacks on over 70 percent of companies According to recent publications from Europol and Statista, ransomware attacks continue to…

Read more

Secure data in production
Secure data in production

IT and OT are merging more and more, with the effect that production environments can also be directly affected by cyber attacks. A particularly drastic example occurred last year when hackers paralyzed Toyota's entire production facility. Nils Gerhardt, Chief Technology Officer, from Utimaco shows five principles that companies should observe in order to secure their production in the best possible way. Encrypt sensitive data Software-based data and folder encryption ensures that, if in doubt, criminals cannot do anything with stolen data. This means that trade secrets are protected even if a company falls victim to a hacker attack. Effective…

Read more

Invest in post-quantum cryptography
B2B Cyber ​​Security ShortNews

Google is already using a quantum-safe encryption process (post-quantum cryptography) in its latest version of the Chrome browser. Companies should do the same. The quantum-safe key encapsulation process in the Chrome browser protects the exchange of symmetric keys when establishing secure TLS connections. Is this step necessary even though practical use of quantum computers is not yet foreseeable in the near future? Yes, says Nils Gerhardt, CTO at Utimaco. Preparing for the future “In fact, we cannot yet say when practical use of quantum computers can be expected or when criminals will have access to them. But…

Read more

Post-quantum cryptography: encryption against quantum computers
Post-quantum cryptography: encryption against quantum computers

Algorithms used today for encryption may soon prove too weak - once quantum computers become practical. Algorithms and hardware must therefore be developed that can also withstand these powerful supercomputers: post-quantum cryptography. A few years ago, the US federal agency National Institute of Standards and Technology (NIST) initiated a process to define/evaluate quantum-resistant algorithms. The potential candidates were selected in various rounds. In total, more than 80 algorithms were proposed, some of which were dropped quite early. The reason for this was that mathematical attacks were developed for quantum computers that break the algorithms...

Read more