Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

card payments security
Blog post

Visa PIN Security Program Update: Navigating Changes in PCI PIN Compliance

In the ever-evolving landscape of cybersecurity and data protection, Visa has recently announced a significant shift in its approach to PCI PIN.
laptop with bank and atm icons
Blog post

What is an HSM-based Payment Server

The Banking and financial services industry is challenged by PSD2. On top of this, they need to manage Identity and access management, cryptographic key management, use blockchains, go to the cloud and stay compliant.
payment with a card
Blog post

A Panorama of the key blocks

A key block is a special cryptographic structure designed to protect cryptographic keys when they are transported over networks which are potentially insecure.
blog-why-does-the-shift-from-pci-pts-v1-to-v3
Blog post

Why does the Shift from PCI PTS v1 to v3 and PCI PIN Security Mandate a Key Block-Oriented Architecture?

This article highlights the use of key blocks for securing cryptographic keys under the latest versions of PCI PTS and PCI PIN Security. 
blog-distinctive-requirements-between-pci-pts
Blog post

Distinctive Requirements between PCI PTS HSM v2.0 and v3.0

Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3, companies have started working on v3 compliant HSMs. See the differences between v2 and v3.
blog-pci-dss-physical-security-requirements-for-hsms
Blog post

PCI DSS - Physical Security Requirements for HSMs - Utimaco

This article summarized and highlighted the 8 core physical security standards for HSMs as per the directions of PCI SSC & PCI DSS.
blog-eidas-advantages-of-qes-compared-to-aes-and-where-qes-is-vital
Blog post

“Ability” – Best Practices For Encryption Key Management

Read six best practices to consider with an encryption solution and its centralized key manager. Use a key manager to minimize the risk of a network or single point of failure and avoid large impacts on overall data security.
blog-is-blockchain-fit-for-the-post-quantum-future
Blog post

Is blockchain fit for the post-quantum future?

Cryptography is one of the cornerstones of all blockchain infrastructures. A major advantage of blockchain is that its cryptography manges it virtually untamperable, with changes in the crypto being virtually impossible.
blog-key-generation-and-distribution
Blog post

Key generation and distribution considerations for PCI DSS Compliance

Payment Cards Industry Data Security Standard (PCI-DSS) compliance protects vulnerable customers who are unaware of the complex technologies behind the scenes.
blog-pci-dss-technological-requirements
Blog post

PCI DSS technological requirements for Certified Devices

The payment card industry data security standard (PCI DSS) has a large security baseline that it requires for all financial institutions to comply with. Read in this article more about the PCI compliance.
blog-hsm-as-a-service-pci-dss-requirements
Blog post

HSM as a Service – meeting PCI data security standards

Looking at the cost of PCI-DSS compliance and how HSM as a Service can help FinTech companies really save on those compliance costs while still making use of the best-in-class security mechanisms.
blog-intelligent-banking
Blog post

Intelligent banking needs a cybersecurity edge

Advances in financial technology are transforming banking as we know it and this spark innovation is changing the approach of this historically traditional sector.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Downloads von Utimaco

      Besuchen Sie unseren Download-Bereich und wählen Sie aus: Broschüren, Datenblätter, White-Papers und vieles mehr. 

      Fast alle können Sie direkt ansehen und speichern (indem Sie auf den Download-Button klicken).

      Für einige Dokumente muss zunächst Ihre E-Mail-Adresse verifiziert werden. Der Button enthält dann ein E-Mail-Symbol.

      Download via e-mail

       

      Der Klick auf einen solchen Button öffnet ein Online-Formular, das Sie bitte ausfüllen und abschicken. Sie können mehrere Downloads dieser Art sammeln und die Links per E-Mail erhalten, indem Sie nur ein Formular für alle gewählten Downloads ausfüllen. Ihre aktuelle Sammlung ist leer.