Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

IDC Study industrial iot
Blog post

Quantum Computing in the IoT Industry: Opportunities and Threats

How to Leverage the Opportunities and Prepare for the Threats That Quantum Computers Could Bring to the IoT Industry
Absicherung von Medizingeräten
Blog post

IT-Security-Vorgaben und -Hilfsmittel zur Absicherung der funktionalen Sicherheit von Medizingeräten

Die funktionale Sicherheit (functional safety) ist ein maßgeblicher Aspekt zur Freigabe von Medizingeräten. Funktionale Sicherheit hat zum Ziel, medizinische Geräte so auszulegen, dass jede anzunehmende technische Fehlfunktion im Vorfeld erkannt wird und keine Gefährdung für den Menschen darstellt.
a machine with icons around
Blog post

Understanding the Role of Hardware Security Modules in Digital Identities for Machines

Humans are not the only ones that need the security of a digital identity. Machines used in digital transactions are a target for hackers, necessitating the protection that digital identities provide for all stakeholders in order to prevent security breaches.
blog-manageable-secure-machine-identities-as-prerequisite-for-a-secure-internet-of-things
Blog post

Manageable Secure Machine Identities as Prerequisite for a Secure Internet of Things

The accelerated growth of digital transformations and digitalized processes, along with the expansion of Internet of Things (IoT) has exponentially increased the number of machine interactions. This significantly increases the risks that businesses face in maintaining continuity in the event of a cyberattack, which are becoming all too common these days.
Blog Gartner Top Security and Risk Trends
Blog post

Top Security and Risk Trends implications on Cybersecurity Architecture

Gartner recently published their 2021 cyber security report that shows important risk trends in cybersecurity. This article discusses what implications these trends have on cybersecurity architecture.
blog-root-of-trust-iot
Blog post

Root of trust in the Internet of things: interview at cloud computing expo

Interview regarding the role of HSMs as a root of trust in the Internet of Things at a Cloud Computing Expo in Santa Clara, CA
blog-making-security-a-priority
Blog post

Making security a priority in connected cars

The growing number of Internet-connected devices and accessories in the connected car opens it up to new potential points of attack for cybercriminals.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.