The post Microsoft Environments and Certificate Management appeared first on essendi it.
The post Shorter Certificate Lifetimes: Implications for CLM appeared first on essendi it.
The post EcoVadis awards essendi it Silver again in 2026 appeared first on essendi it.
The Cyber Resilience Act (CRA) is fundamentally reshaping Europe’s digital market. For the first time, the EU is requiring manufacturers and providers of …
The EU has created the world’s first comprehensive legal framework for artificial intelligence with the AI Act. The goal: to promote innovation while minimizing …
The post essendi xc 3.1: Simpler and More Automated appeared first on essendi it.
The post Review: essendi it at SAMS 2026 in Berlin appeared first on essendi it.
The post Swiss Quantum Strategy 2026: Preparing for the Quantum Era appeared first on essendi it.
The post Meet essendi it at SAMS 2026 in Berlin appeared first on essendi it.
We’re excited to welcome Mike Borza to the team at PQSecure! Mike Borza is a seasoned cryptography veteran with decades of experience spanning product security, …
The post Digital certificates with increasingly shorter validity period appeared first on essendi it.
The post Swiss Cyber Security Days 2026, Bern appeared first on essendi it.
🔐 Post-Quantum Cryptography must be real, deployable, and secure — across software and silicon. This recent Microchip Technology Inc. blog on Post-Quantum …
PQSecure Technologies collaborated with George Mason University (GMU) on a landmark peer-reviewed research publication titled “Lightweight Champions of the …
PQSecure’s Founder and CEO, Reza Azarderakhsh, was recently featured on the Embedded Executive podcast, where he discussed the growing importance of …
Despite technological advances, phishing remains the most common attack vector in organizations — and attackers are becoming increasingly sophisticated. …
The post New Impetus for Automation in Certificate Management appeared first on essendi it.
PQSecure is expanding its team and looking for a Product Commercialization / Licensing Lead to help bring our post-quantum cryptographic hardware and software …
For a long time, it seemed as if the implementation of the EU NIS-2 Directive in Germany was at a standstill – but now things are finally moving forward. The …
Since June 2025, the joint project between G DATA CyberDefense AG and TÜV TRUST IT has been making steady progress in implementing the Cyber Resilience Act …
We’re proud to announce that PQSecure’s Rust cryptographic libraries have been officially validated through NIST’s Cryptographic Algorithm Validation Program …
With the Final Government Draft of the KRITIS Umbrella Act, Germany Specifies National Implementation of the EU CER Directive The German government has …
EVENT: Chunk Works is delighted to announce its collaboration with IT2grow and Protinus IT to share our vision at the renowned CyberSecurityVisie event, a pr...
PERSBERICHT: Met het nieuwe programma “Test IT, See IT, Believe IT, Trust IT & Fixed IT” biedt Chunk Works CxO’s een strategische routekaart om de over...
Security management that fits the job – intuitive, effective, flexible. In an era where cyber threats are increasing daily and security requirements are …
The EU’s Cyber Resilience Act (CRA) introduces far-reaching requirements for manufacturers of digital products – presenting companies with new challenges in IT …
A new article by our PQSecure team is now live on Design & Reuse, in which a critical and often overlooked aspect of PQC, side-channel protection, is discussed. …
After the traffic light coalition stalled both in implementing the NIS-2 Directive and the KRITIS Framework Act for the implementation of the CER Directive, a …
In collaboration with Menta, PQSecure has demonstrated how hardware/software co-design with eFPGA can deliver both performance and flexibility for post-quantum …
Open-source is a great start, but it’s not a complete solution for deploying secure post-quantum cryptography. Dr. Reza Azarderakhsh breaks down why in his …
We are pleased to have once again successfully completed the certification of our Trusted App Standard with our long-standing client POTTHOFF + PARTNER. The …
PQSecure is excited to announce that we have joined the Post-Quantum Cryptography (PQC) Consortium at the National Institute of Standards and Technology (NIST) …
Success story Blue NAP Americas Download success story Blue NAP Americas is a Tier-IV certified, carrier-neutral data center in Curaçao, serving the Pan-Car...
Chunk Works, a pioneer in decentralized data infrastructure and next-generation data security solutions, has joined the PKI Consortium, furthering its commit...
Blue NAP Americas partners with Chunk Works to deliver a secure, sovereign, and decentralized data infrastructure, enhancing resilience, scalability, and com...
At Chunk Works, we're turning Cloud Kootwijk vision into reality, pioneering distributed data solutions that restore Dutch digital sovereignty. Here's how.
A Dutch initiative proposes Cloud Kootwijk, a distributed network of data centers, as an alternative to American cloud providers to ensure digital sovereignty.
Chunk Works joins NEXIS and dcypher in promoting a new portal that simplifies access to cybersecurity funding opportunities for organizations across Europe.
In today's threat landscape, static data storage is a liability. Learn how intelligent systems are revolutionizing data protection and autonomy.
As we move into a future where digital threats are constantly evolving, staying ahead of the curve is essential for maintaining robust...
Innovation often faces hurdles, and the Cross Domain Hybrid Application (CDHA) architecture is no exception. Resistance to new...
Implementing Cross Domain Hybrid Application (CDHA) architecture in government data systems introduces a paradigm shift in security...
Welcome back to our ongoing exploration of CDHA, where advanced technology meets security to redefine data protection in today’s digital...
As discussed in our previous blog, one of the key benefits of the CDHA architecture is its support for robust two-way communication and...
Is CDHA Just Another Gateway? Absolutely not! Here’s why: Gateways and diodes are crucial for securing high trust domains, acting as...
In the digital world where data holds more value than currency, we discover a major issue at the core of both public and government...
Despite more than a decade of talk, the seminal concept in cybersecurity of zero trust — the assumption that no user or device on a computer network can be …
While ransomware has been around for decades, its prevalence has exploded in the last few years. These attacks used to be perpetrated by individuals; now, …