Blog

Wultra Opens Singapore Office to Support Post-Quantum Security Growth

COMPANY NEWS
PRESS RELEASE
COMPANY NEWS

We’re excited to announce the opening of Wultra’s new office in Singapore — our first location in Asia. This step strengthens our support for banks and fintech companies, especially across Southeast Asia as they prepare for the post-quantum era and the next generation of secure digital authentication.

Passkeys and FIDO2 Quietly Became Quantum-Safe: Here’s What Changed

FIDO2
POST-QUANTUM
FIDO2

A quiet but essential shift has just made passkeys — the future of secure passwordless authentication — ready for the quantum era.

Highlights from our webinar: Post-quantum authentication. Why banks should start the transition today

WEBINAR
POST-QUANTUM
COMPANY EVENT
WEBINAR

In our latest webinar, Wultra’s special guest, Jiří Pavlů, a Mathematical Security Expert at Raiffeisen Bank’s Cryptology and Biometrics Competence Centre, joined Petr Dvořák, Wultra’s CEO and founder, for an insightful discussion about post-quantum authentication.

When Mobile Isn’t Enough: A FIDO2 Solution to PSD3/PSR Compliance

PSD3/PSR1
FIDO2
PSD3/PSR1

The upcoming PSD3 and Payment Services Regulation (PSR) introduce new expectations for how banks and payment service providers approach strong customer authentication (SCA). One of the most significant changes is the requirement to offer an alternative authentication method for users who cannot—or choose not to—use smartphones.

5 Excuses That Are Preventing Your Organization From Moving to Better Authentication

PASSKEYS
SMS OTP
FRAUD PREVENTION
PASSKEYS

By challenging common authentication-related excuses with critical thinking, your organization can take a proactive approach to security and strengthen your authentication.

The Impact of Quantum Computing on Authentication: What You Need to Know

PASSKEYS
FIDO2
POST-QUANTUM
PASSKEYS

The rise of quantum computing is reshaping the foundations of cryptography and, by extension, authentication. While many industries rely on authentication methods like FIDO2 tokens, X.509 certificates, RFID tokens, mobile push authentication, OTP tokens, and more, these mechanisms heavily depend on cryptographic algorithms that will soon be obsolete.

Why Post-Quantum Authentication is the Best Choice in 2025 Authentication Tenders

POST-QUANTUM
REGIONAL COMPLIANCE
POST-QUANTUM

Recent advancements in quantum computing and the NIST standardization of quantum-resistant cryptography have motivated security-conscious organizations to assess the impact of the quantum threat across their digital ecosystems and explore innovative cyber-security solutions, including post-quantum authentication, to stay ahead of emerging threats.

3 Paths to Post-Quantum Authentication: How to Choose the Right Migration Strategy

POST-QUANTUM
POST-QUANTUM

With the advent of quantum computing, organizations must transition from legacy authentication methods to post-quantum authentication (PQA) before Q-Day — the point when quantum computers can break conventional encryption. However, switching to PQA isn’t just a technical upgrade; it’s a transformation that impacts user experience, security, and compliance.

Post-Quantum Cryptography: The Hidden Compliance Challenge for European Banks

DIGITAL IDENTITY
PSD3/PSR1
POST-QUANTUM
DIGITAL IDENTITY

European banks are already navigating complex regulatory changes, including PSD3/PSR and the EU Digital Identity Wallet. However, a third less visible but equally urgent challenge looms: Post-quantum cryptography (PQC). While compliance and digital identity projects dominate the conversation, banks must prepare for a cryptographic shift that will define the security of financial services in the next decade.

Harvest Now, Decrypt Later: Is This the Only Quantum Threat?

USER AUTHENTICATION
QUANTUM COMPUTING
USER AUTHENTICATION

"Harvest now, decrypt later" has become the phrase on everyone’s lips when discussing post-quantum cryptography. The idea is simple: Adversaries collect encrypted data today and wait for the arrival of quantum computers that can break current encryption methods. But is this really the only threat we should focus on?

Exploring Hard Token Types: Which Is the Best for Your Business?

FIDO2
HARD TOKEN
FIDO2

When exploring the various hard token types on the market, here’s why Talisman stands out as the top choice for banks and fintech companies.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.