Blog

Blog

Für Blogbeiträge zu einem populären Thema klicken Sie auf eines der Schlagwörter:

Alle Blogbeiträge

zero trust architecture
Blog

Introduction to Zero Trust Architecture

Due to the exponential increase in cyber threats and attacks, Zero Trust Architecture (ZTA) has become the latest trend in enterprise cybersecurity.
digital certificate
Blog

eIDAS 2.0 - Roadmap, Toolbox, and The European Digital Identity Architecture

EUDI Wallets are mobile applications or cloud services that collect and store digital credentials and allow them to be used secretly and securely for numerous government and non-government use cases.
Digital ID
Blog

eIDAS 2.0 - Introduction to The European Digital Identity Wallet & The Evolution of Self-Sovereign Identity

The European Commission proposed an update to its pan-European digital identity framework. It will enable every European to have a set of digital identity credentials that are recognized all across the EU.
A doctor holding a tablet with digital icons
Blog

5G Security in Connected Hospitals

Every component of a 5G network must have security measures in place to mitigate many of the threats encountered in the era of the 5G network.
Big Wide Data
Blog

Open Banking + Open Finance = Big & Wide Data

As Open Finance is the next step in the Open Banking journey, we look at how this acceleration could reshape the financial services ecosystem, revolutionizing the way financial service providers operate and the significant benefits of big and wide data.
Gartner Top Security and Risk Management Trends 2022
Blog

Gartner’s 2022 Top Security and Risk Management Trends - Consolidating what began in 2021

In this article we compare Gartner’s findings on trends in Security and Risk Management in 2021 and 2022.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.