Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

device attestation
Blog post

Streamlining Device Security with Device Attestation

Device attestation solutions emerge as indispensable tools, providing a shield against unauthorized access, data breaches, and malicious activities.
IoT
Blog post

Hindernis oder Treiber: Ist Cybersicherheit zu Recht ein IIoT-Bremser oder ist IIoT der Weg, um industrielle Cybersecurity zu verbessern?

Zentrales Ergebnis der IDC-Studie: Aktuell setzen in Deutschland nur 3 von 10 Industrieunternehmen aktiv IIoT-Projekte um.
blog-how-to-select-an-hsm
Blog post

How to select an HSM vendor

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
a machine with icons around
Blog post

Understanding the Role of Hardware Security Modules in Digital Identities for Machines

Humans are not the only ones that need the security of a digital identity. Machines used in digital transactions are a target for hackers, necessitating the protection that digital identities provide for all stakeholders in order to prevent security breaches.
Understanding Supply Chain Attacks - How to Protect Your Supply
Blog post

Understanding Supply Chain Attacks - How to Protect Your Supply

Supply chain attacks threatened the interconnectedness of global markets. It is common for multiple customers to rely on the same supplier. Therefore, a single cyberattack could potentially have a large-scale national or cross-border impact.
Understanding Supply Chain Attacks - What You Need to Know
Blog post

Understanding Supply Chain Attacks - What You Need to Know

Supply chain attacks are nothing new. However, these attacks have become more organized since the early part of 2020. Now, cybercriminals have turned their focus to suppliers versus organizations to make a far greater impact with damages.
blog-remote-management-in-the-age-of-global-disruptions
Blog post

Remote Management in the Age of Global Disruptions

As the world comes to terms with the COVID-19 pandemic and social distancing becomes a focal point in flattening the curve, businesses around the globe are confronted with challenges associated with remote management.
blog-afd-fleet-cards-transition-from-3des-to-aes
Blog post

AFD Fleet Cards - Transition from 3DES to AES

In this article we will focus on fleet cards issued by banks and/or follow a payment card association scheme (Visa, MasterCard, etc.) and the necessary transition from 3DES to AES encryption.
blog-emv-for-fleet-cards
Blog post

EMV for Fleet Cards - Does it make sense for AFD Fuel Cards?

EMV could reshape the future of fleet & fuel cards. This can help managers grow and strengthen their fleets’ overall performance.
blog-fleet-cards-fuel-cards-and-afd
Blog post

Fleet Cards, Fuel Cards, and AFD - Key Answers on PCI Compliance, Crypto-Security and the EMV shift in October 2020

Today, Automatic Fuel Dispenser fraud is a sad reality. Gas pumps are impacted by skimmers, cloned fuel cards, and other schemes. This forces fuel merchants to adopt chip technology as a way to prevent counterfeit frauds. 
blog-how-blockchain-allows-car-manufacturers
Blog post

How Blockchain Allows Car Manufacturers to Create Digital Passports

This article explains how blockchain technologies can allow car manufacturers to offer irrefragable digital passports for the buyers and owners of the vehicles they sell.
blog-how-blockchain-disrupts-automotive
Blog post

How Blockchain Disrupts the Automotive Industry

It is estimated that around 62 percent of the global automotive industry will use blockchain technologies as early as 2021. Many car manufacturers are currently investing in Distributed Ledgers Technologies (DLT) projects.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Downloads von Utimaco

      Besuchen Sie unseren Download-Bereich und wählen Sie aus: Broschüren, Datenblätter, White-Papers und vieles mehr. 

      Fast alle können Sie direkt ansehen und speichern (indem Sie auf den Download-Button klicken).

      Für einige Dokumente muss zunächst Ihre E-Mail-Adresse verifiziert werden. Der Button enthält dann ein E-Mail-Symbol.

      Download via e-mail

       

      Der Klick auf einen solchen Button öffnet ein Online-Formular, das Sie bitte ausfüllen und abschicken. Sie können mehrere Downloads dieser Art sammeln und die Links per E-Mail erhalten, indem Sie nur ein Formular für alle gewählten Downloads ausfüllen. Ihre aktuelle Sammlung ist leer.