Blog

General purpose HSM

blog-introduction-into-public-key-infrastructure
Blog

Introduction into public key infrastructure and hardware security modules

A public key infrastructure (PKI) is the framework needed to manage public-key encryption. PKI protects communications between companies and users to exchange information and money safely and securely.
blog-how-to-select-an-hsm
Blog

How to select an HSM

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
ABI Research awards
Blog

Utimaco named the Overall Leader and Top Implementer in the HSM Market by ABI Research

The latest Hardware Security Module, OEM competitive assessment by global technology intelligence firm ABI Research, announced Utimaco as the overall leader in the HSM market.
chip shortage
Blog

How Utimaco is addressing the global supply chain chip shortage

The severity of the global chip shortage has disrupted companies throughout 2021 and as we enter 2022, the shortage isn’t going to disappear. As a result, the current processor-chip shortage and supply-chain disruption may have a long-term impact on price and availability.
locker icons
Blog

Understanding the Role of Hardware Security Modules in Symmetric Key Encryption

Organizations face an ever-present risk of data breaches as digital transformations continue to flourish in the business scape. Encryption plays a critical part in mitigating business risks and keeping data safe.
somebody is clicking on the phone
Blog

Understanding the Role of Hardware Security Modules in Public Key Infrastructure (PKI)

Public key infrastructure protects communications between users and website servers. The underlying Hardware Security Modules are the root of trust which protect PKI from being breached.
Blog Gartner Top Security and Risk Trends
Blog

Top Security and Risk Trends implications on Cybersecurity Architecture

Gartner recently published their 2021 cyber security report that shows important risk trends in cybersecurity. This article discusses what implications these trends have on cybersecurity architecture.
Lily Chen (NIST) - Getting Prepared for the Migration towards PQC
Blog

Lily Chen (NIST) - Getting Prepared for the Migration towards PQC

Lily Chen (NIST), the manager of the Crypto Technology Group at NIST, advises CIOs and CISOs to get prepared for the migration towards PQC soon.
blog-what-is-an-hsm-based-payment-server
Blog

What is an HSM-based Payment Server

The Banking and financial services industry is challenged by PSD2. On top of this, they need to manage Identity and access management, cryptographic key management, use blockchains, go to the cloud and stay compliant.
blog-state-of-symmetric-hash-algorithms-after-quantum-computing
Blog

State of Symmetric & Hash Algorithms after Quantum Computing

The importance of cryptography is increasing. The formalization of quantum computing platforms poses serious threats to the cryptographic algorithms. Be informed about the omplications of quantum computing on the present cryptography.
blog-making-blockchain-technology-secure-and-auditable
Blog

Making Blockchain Technology Secure and Auditable

Modern blockchain technology is evolving. The transfer of trusted data to the blockchain technology makes it essential for blockchains to be implemented in a secure manner.
blog-eidas-advantages-of-qes-compared-to-aes-and-where-qes-is-vital
Blog

eIDAS: The Advantages of QES as compared to AES

Know the main requirements that must be met to be complient for Advanced and Qualified Electronic Signatures with eIDAS electronic transactions in the European internal market.