Blog

Manufacturing & IoT

blog-how-to-select-an-hsm
Blog

How to select an HSM

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
a machine with icons around
Blog

Understanding the Role of Hardware Security Modules in Digital Identities for Machines

Humans are not the only ones that need the security of a digital identity. Machines used in digital transactions are a target for hackers, necessitating the protection that digital identities provide for all stakeholders in order to prevent security breaches.
Understanding Supply Chain Attacks - What You Need to Know
Blog

Understanding Supply Chain Attacks - What You Need to Know

Supply chain attacks are nothing new. However, these attacks have become more organized since the early part of 2020. Now, cybercriminals have turned their focus to suppliers versus organizations to make a far greater impact with damages.
Understanding Supply Chain Attacks - How to Protect Your Supply
Blog

Understanding Supply Chain Attacks - How to Protect Your Supply

Supply chain attacks threatened the interconnectedness of global markets. It is common for multiple customers to rely on the same supplier. Therefore, a single cyberattack could potentially have a large-scale national or cross-border impact.
blog-fleet-cards-fuel-cards-and-afd
Blog

Fleet Cards, Fuel Cards, and AFD - Key Answers on PCI Compliance, Crypto-Security and the EMV shift in October 2020

Today, Automatic Fuel Dispenser fraud is a sad reality. Gas pumps are impacted by skimmers, cloned fuel cards, and other schemes. This forces fuel merchants to adopt chip technology as a way to prevent counterfeit frauds. 
blog-how-entrust-datacard-pioneers-the-road-to-post-quantum-with-utimaco
Blog

How Entrust Datacard pioneers the road to post-quantum with Utimaco - in spite of all uncertainties

Sandy Carielli faces all the unanswered questions, to advice Entrust Datacard's partners and customers on how to move forward in the context of post-quantum cryptography.
blog-how-samsung-prepares-devices
Blog

How Samsung prepares devices sold today for a life in the post-quantum era

In this video blog, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center, describes his company’s strategy to develop products today which are prepared for the post quantum era.
blog-root-of-trust-iot
Blog

Root of trust in the Internet of things: interview at cloud computing expo

Interview regarding the role of HSMs as a root of trust in the Internet of Things at a Cloud Computing Expo in Santa Clara, CA