Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

device attestation
Blogbeitrag

Streamlining Device Security with Device Attestation

Device attestation solutions emerge as indispensable tools, providing a shield against unauthorized access, data breaches, and malicious activities.
IoT
Blogbeitrag

Hindernis oder Treiber: Ist Cybersicherheit zu Recht ein IIoT-Bremser oder ist IIoT der Weg, um industrielle Cybersecurity zu verbessern?

Zentrales Ergebnis der IDC-Studie: Aktuell setzen in Deutschland nur 3 von 10 Industrieunternehmen aktiv IIoT-Projekte um.
blog-how-to-select-an-hsm
Blogbeitrag

How to select an HSM vendor

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
a machine with icons around
Blogbeitrag

Understanding the Role of Hardware Security Modules in Digital Identities for Machines

Humans are not the only ones that need the security of a digital identity. Machines used in digital transactions are a target for hackers, necessitating the protection that digital identities provide for all stakeholders in order to prevent security breaches.
Understanding Supply Chain Attacks - What You Need to Know
Blogbeitrag

Understanding Supply Chain Attacks - What You Need to Know

Supply chain attacks are nothing new. However, these attacks have become more organized since the early part of 2020. Now, cybercriminals have turned their focus to suppliers versus organizations to make a far greater impact with damages.
Understanding Supply Chain Attacks - How to Protect Your Supply
Blogbeitrag

Understanding Supply Chain Attacks - How to Protect Your Supply

Supply chain attacks threatened the interconnectedness of global markets. It is common for multiple customers to rely on the same supplier. Therefore, a single cyberattack could potentially have a large-scale national or cross-border impact.
blog-remote-management-in-the-age-of-global-disruptions
Blogbeitrag

Remote Management in the Age of Global Disruptions

As the world comes to terms with the COVID-19 pandemic and social distancing becomes a focal point in flattening the curve, businesses around the globe are confronted with challenges associated with remote management.
blog-afd-fleet-cards-transition-from-3des-to-aes
Blogbeitrag

AFD Fleet Cards - Transition from 3DES to AES

In this article we will focus on fleet cards issued by banks and/or follow a payment card association scheme (Visa, MasterCard, etc.) and the necessary transition from 3DES to AES encryption.
blog-emv-for-fleet-cards
Blogbeitrag

EMV for Fleet Cards - Does it make sense for AFD Fuel Cards?

EMV could reshape the future of fleet & fuel cards. This can help managers grow and strengthen their fleets’ overall performance.
blog-fleet-cards-fuel-cards-and-afd
Blogbeitrag

Fleet Cards, Fuel Cards, and AFD - Key Answers on PCI Compliance, Crypto-Security and the EMV shift in October 2020

Today, Automatic Fuel Dispenser fraud is a sad reality. Gas pumps are impacted by skimmers, cloned fuel cards, and other schemes. This forces fuel merchants to adopt chip technology as a way to prevent counterfeit frauds. 
blog-how-blockchain-allows-car-manufacturers
Blogbeitrag

How Blockchain Allows Car Manufacturers to Create Digital Passports

This article explains how blockchain technologies can allow car manufacturers to offer irrefragable digital passports for the buyers and owners of the vehicles they sell.
blog-how-blockchain-disrupts-automotive
Blogbeitrag

How Blockchain Disrupts the Automotive Industry

It is estimated that around 62 percent of the global automotive industry will use blockchain technologies as early as 2021. Many car manufacturers are currently investing in Distributed Ledgers Technologies (DLT) projects.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Ihre Download-Sammlung ist leer. Besuchen Sie unseren Download-Bereich und wählen Sie aus Ressourcen wie Datenblättern, Whitepapers, Webinar-Aufzeichnungen und vielem mehr.

      Downloads
      0