Blog

Compliance

blog-how-to-select-an-hsm
Blog

How to select an HSM

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
digital key on a dark background
Blog

What is Key Escrow, and how can it be used properly?

Key Escrow will ensure the data you have lost, will be recoverable. Unlike an emergency cash reserve hidden under the mattress, a cryptographic Key Escrow must be established and handled properly in order to remain effective.
eInvoicing teaser
Blog

eInvoicing - ensuring compliance with the EU VAT Directive

eInvoicing is a digital solution that enables public sector contractors and companies to receive and process electronic invoices that comply with the European standard.
blog-hardware-security-modules-according-to-iso-13491
Blog

Hardware Security Modules According to ISO 13491 and the Relation to ANSI x9.24-1-2017

This article will examine Hardware Security Modules (HSMs) according to ISO 13491 and how their relationship to ANSI x9.24-1-2017.
blog-why-does-the-shift-from-pci-pts-v1-to-v3
Blog

Why does the Shift from PCI PTS v1 to v3 and PCI PIN Security Mandate a Key Block-Oriented Architecture?

This article highlights the use of key blocks for securing cryptographic keys under the latest versions of PCI PTS and PCI PIN Security. 
blog-pci-pin-transaction-security-pts-hsm-v3-requirements
Blog

PCI PIN Transaction Security (PTS) HSM v3 Requirements

HSM's are a critical component in data integrity and confidentiality assurance of business transactions. Organizations and banks employ security services such as encryption, decryption and strong authentication between identities and applications.
blog-atalla-at1000-utimacos-pci-pts-hsm-v3-compliant-hsm
Blog

Atalla AT1000: Utimaco’s PCI PTS HSM v3 compliant HSM

Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3.0 in June 2016, companies had started working on v3.0 compliant HSMs which is necessary for security and legal obligations.
blog-distinctive-requirements-between-pci-pts
Blog

Distinctive Requirements between PCI PTS HSM v2.0 and v3.0

Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3, companies have started working on v3 compliant HSMs. See the differences between v2 and v3.
blog-an-introduction-to-the-regulatory-technical-standards-part-3
Blog

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 3: Achieving Transactional & Account Security

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-2
Blog

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 2: PSD2

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-1
Blog

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 1: eIDAS

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-the-pci-pts-hsm-v1-expires-guidelines
Blog

The PCI PTS HSM v1 expires - Guidelines for the Transition Towards v3

HSMs are importand for enterprises for the protection of clients and business transactions. This article enlightens the expiry of version 1.0 of the PCI PTS HSM validation and the latest standard available version 3.0.