By 2026, Europe's digital identity system is transitioning from experimentation to infrastructure, emphasizing accountability and operational resilience over pilot success. The focus will shift to governance challenges, including integration, regulatory…
By 2026, Europe's digital identity system is transitioning from experimentation to infrastructure, emphasizing accountability and operational resilience over pilot success. The focus will shift to governance challenges, including integration, regulatory…
Ubiqu and Thales have teamed up to address the complexities of deploying certified infrastructure for European Digital Identity (EUDI) wallets under eIDAS 2.0. Their collaboration integrates Ubiqu's Remote Secure Element with Thales' Luna…
Ubiqu and Thales have teamed up to address the complexities of deploying certified infrastructure for European Digital Identity (EUDI) wallets under eIDAS 2.0. Their collaboration integrates Ubiqu's Remote Secure Element with Thales' Luna…
Germany's activation of the NIS2 Directive transforms supply-chain governance by allowing the Federal Office for Information Security to prohibit ICT components posing unacceptable risks. This move emphasizes that true…
Germany's activation of the NIS2 Directive transforms supply-chain governance by allowing the Federal Office for Information Security to prohibit ICT components posing unacceptable risks. This move emphasizes that true…
Digital identity wallets are transitioning from pilot programs to enterprise environments, where they must integrate with existing Identity and Access Management (IAM) systems. Enterprises seek reliability, revocation, and…
Digital identity wallets are transitioning from pilot programs to enterprise environments, where they must integrate with existing Identity and Access Management (IAM) systems. Enterprises seek reliability, revocation, and…
In 2025, digital identity and quantum security evolved rapidly, with The Quantum Space growing significantly. Audience engagement and emerging trends in AI and regulatory agendas shaped the secured-tech industry’s future.
In 2025, digital identity and quantum security evolved rapidly, with The Quantum Space growing significantly. Audience engagement and emerging trends in AI and regulatory agendas shaped the secured-tech industry’s future.
The latest Innovating Trust podcast episode, "The Encryption of Christmas," explores the security technologies supporting festive logistics, payment systems, and vulnerabilities, addressing how trusted tech shapes holiday infrastructure.
The latest Innovating Trust podcast episode, "The Encryption of Christmas," explores the security technologies supporting festive logistics, payment systems, and vulnerabilities, addressing how trusted tech shapes holiday infrastructure.
By late 2025, quantum computing has matured, shifting from speculation to pragmatic engineering. Key players like IonQ and IBM have focused on refining performance metrics and modularity. Europe enhances its ecosystem through collaboration,…
By late 2025, quantum computing has matured, shifting from speculation to pragmatic engineering. Key players like IonQ and IBM have focused on refining performance metrics and modularity. Europe enhances its ecosystem through collaboration,…
The emergence of two distinct digital identity models is highlighted through Apple and the European Digital Identity Wallet (EUDI). Apple’s approach relies on the iPhone for secure, user-friendly identity verification, while EUDI emphasizes a…
The emergence of two distinct digital identity models is highlighted through Apple and the European Digital Identity Wallet (EUDI). Apple’s approach relies on the iPhone for secure, user-friendly identity verification, while EUDI emphasizes a…
The 2025 Biometric Digital Identity Prism Report emphasizes a significant shift in the digital identity ecosystem, driven by rising fraud and privacy demands. It advocates for Resilient Trust, intertwining privacy and fraud prevention, highlighting Europe's…
The 2025 Biometric Digital Identity Prism Report emphasizes a significant shift in the digital identity ecosystem, driven by rising fraud and privacy demands. It advocates for Resilient Trust, intertwining privacy and fraud prevention, highlighting Europe's…
The latest episode of the Innovating Trust podcast discusses the enduring significance of smart cards in the security industry. It examines their role in various applications, Europe's dominance in the supply chain, and the impact of emerging technologies…
The latest episode of the Innovating Trust podcast discusses the enduring significance of smart cards in the security industry. It examines their role in various applications, Europe's dominance in the supply chain, and the impact of emerging technologies…
In Part 3 of this series we examine the future of secure identity systems, emphasizing that while smart cards may fade, their foundational technology will evolve. Post-quantum cryptography and AI governance necessitate a shift towards embedded…
In Part 3 of this series we examine the future of secure identity systems, emphasizing that while smart cards may fade, their foundational technology will evolve. Post-quantum cryptography and AI governance necessitate a shift towards embedded…
TRUSTECH 2025 — Infineon is setting one of the clearest strategic lines on the show floor this year, presenting a unified story that brings together high-assurance authentication, post-quantum–ready hardware and the next wave of…
TRUSTECH 2025 — Infineon is setting one of the clearest strategic lines on the show floor this year, presenting a unified story that brings together high-assurance authentication, post-quantum–ready hardware and the next wave of…
Part 2 of this series discusses the complex ecosystem behind smart cards, emphasizing their critical role in trust infrastructures across various sectors. It highlights the detailed supply chain, including secure elements and specialized…
Part 2 of this series discusses the complex ecosystem behind smart cards, emphasizing their critical role in trust infrastructures across various sectors. It highlights the detailed supply chain, including secure elements and specialized…
Smart cards have been crucial for over three decades, enabling secure payments, identity verification, and various public services. Despite predictions of obsolescence, they continue to evolve, proving resilient through integration and robust…
Smart cards have been crucial for over three decades, enabling secure payments, identity verification, and various public services. Despite predictions of obsolescence, they continue to evolve, proving resilient through integration and robust…
Europe is advancing its EU Digital Identity Wallet initiative, with significant industry collaboration ahead of the 2025 implementation deadline. By late 2026, every Member State must offer a certified wallet. Over 75 German…
Europe is advancing its EU Digital Identity Wallet initiative, with significant industry collaboration ahead of the 2025 implementation deadline. By late 2026, every Member State must offer a certified wallet. Over 75 German…
The Innovating Trust podcast discusses the merging of hardware, cryptography, AI, and identity systems into a cohesive trust layer, addressing security challenges and future implications for governments and companies.
The Innovating Trust podcast discusses the merging of hardware, cryptography, AI, and identity systems into a cohesive trust layer, addressing security challenges and future implications for governments and companies.
This article concludes the TQS series on Hardware Roots of Trust, highlighting the need for quantum-ready hardware to enhance digital trust across industries. It emphasizes the shift towards hybrid cryptography, long-term security design, and the importance of EU…
This article concludes the TQS series on Hardware Roots of Trust, highlighting the need for quantum-ready hardware to enhance digital trust across industries. It emphasizes the shift towards hybrid cryptography, long-term security design, and the importance of EU…
The article discusses the evolution of artificial intelligence (AI) from cloud-based systems to edge devices, emphasizing the importance of hardware-based security measures like Secure Boot and Trusted Execution Environments. It highlights various industrial applications,…
The article discusses the evolution of artificial intelligence (AI) from cloud-based systems to edge devices, emphasizing the importance of hardware-based security measures like Secure Boot and Trusted Execution Environments. It highlights various industrial applications,…
This article discusses the importance of hardware roots of trust in the Industrial Internet of Things (IIoT) to ensure data integrity and security amidst increasing cyber threats. It highlights mechanisms like cryptographic identities, secure boot processes, and…
This article discusses the importance of hardware roots of trust in the Industrial Internet of Things (IIoT) to ensure data integrity and security amidst increasing cyber threats. It highlights mechanisms like cryptographic identities, secure boot processes, and…
The latest episode of the Innovating Trust podcast delves into the impact of quantum computing on blockchain security. It discusses how quantum algorithms threaten existing cryptocurrency systems, exploring concepts like "proof-of-worry" and evolving risk…
The latest episode of the Innovating Trust podcast delves into the impact of quantum computing on blockchain security. It discusses how quantum algorithms threaten existing cryptocurrency systems, exploring concepts like "proof-of-worry" and evolving risk…
This article introduces a series on Hardware Roots of Trust, highlighting the significance of secure silicon and cryptographic designs in establishing digital trust across AI and industrial IoT. It addresses the importance of hardware integrity in decision-making and outlines…
This article introduces a series on Hardware Roots of Trust, highlighting the significance of secure silicon and cryptographic designs in establishing digital trust across AI and industrial IoT. It addresses the importance of hardware integrity in decision-making and outlines…
This article discusses quantum computing's threat to blockchain security, focusing on the "Harvest now, decrypt later" (HNDL) strategy. Attackers can harvest blockchain data today, confident they'll decrypt it in the future. With over 60% of transactions vulnerable…
This article discusses quantum computing's threat to blockchain security, focusing on the "Harvest now, decrypt later" (HNDL) strategy. Attackers can harvest blockchain data today, confident they'll decrypt it in the future. With over 60% of transactions vulnerable…
Germany has initiated the quantum-ready identity era by demonstrating a national ID card secured with hybrid cryptography, blending classical and post-quantum methods. This advancement emphasizes the urgency for national identity systems to…
Germany has initiated the quantum-ready identity era by demonstrating a national ID card secured with hybrid cryptography, blending classical and post-quantum methods. This advancement emphasizes the urgency for national identity systems to…
This article discusses how quantum computing is transforming cryptocurrency trading, introducing quantum arbitrage that operates faster than classical methods. This technology promises to create tiers in the market, favoring quantum-enabled traders. Alongside challenges to…
This article discusses how quantum computing is transforming cryptocurrency trading, introducing quantum arbitrage that operates faster than classical methods. This technology promises to create tiers in the market, favoring quantum-enabled traders. Alongside challenges to…
The latest episode of Innovating Trust explores the reliability of digital twins in modern industries and discusses how autonomous systems depend on trustworthy digital counterparts amid increasing cybersecurity risks.
The latest episode of Innovating Trust explores the reliability of digital twins in modern industries and discusses how autonomous systems depend on trustworthy digital counterparts amid increasing cybersecurity risks.