Blog

Entradas de blog

Press releases

Para encontrar entradas de blog con un tema específico, haga clic en una de las palabras clave más populares.

blog-how-entrust-datacard-pioneers-the-road-to-post-quantum-with-utimaco
Entrada de blog

How Entrust Datacard pioneers the road to post-quantum with Utimaco - in spite of all uncertainties

Sandy Carielli faces all the unanswered questions, to advice Entrust Datacard's partners and customers on how to move forward in the context of post-quantum cryptography.
Payment HSM as a service
Entrada de blog

NIST shortlisted 26 algorithms for focal post-quantum research

Since the development of quantum computing, some cryptographic algorithms have been compromised. Read here about current threats to crypto applications and how you can mitigate the security risks.
blog-how-samsung-prepares-devices
Entrada de blog

How Samsung prepares devices sold today for a life in the post-quantum era

In this video blog, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center, describes his company’s strategy to develop products today which are prepared for the post quantum era.
blog-crypto-agile-hsms-by-utimaco
Entrada de blog

Crypto-agile HSMs by Utimaco used in research for post-quantum cryptography

The need for crypto agility becomes more important. HSMs play a critical role in crypto agility and safeguarding digital keys as they provide the secure environment for executing the cryptographic algorithms to generate these keys.
blog-michele-mosca-quantum-computing
Entrada de blog

Michele Mosca: Quantum computing will decimate the security infrastructure of the digital economy (video)

Michele Mosca explains why researchers all around the globe are ambitiously working on a new generation of cryptographic infrastructure and algorithms to withstand the quantum-enforced new generation of attack models.
blog-is-blockchain-fit-for-the-post-quantum-future
Entrada de blog

Is blockchain fit for the post-quantum future?

Cryptography is one of the cornerstones of all blockchain infrastructures. A major advantage of blockchain is that its cryptography manges it virtually untamperable, with changes in the crypto being virtually impossible.
blog-utimaco-applied-crypto-symposium
Entrada de blog

Utimaco Applied Crypto Symposium in the US 2018

Quantum computers will revolutionize many industries and will be powerful enough to break all commonly used public key cryptographic algorithms.
what is crypto agility
Entrada de blog

What is crypto-agility and how to achieve it?

Crypto-agility can be elaborated as the ability and aptitude of a system to promptly shift from the existing cryptographic algorithms and primitives to the newer and updated ones.
blog-eidas-regulation
Entrada de blog

eIDAS regulation: do not make the wrong choice when you are picking your HSM

Advances in financial technology are transforming banking as we know it and this spark innovation is changing the approach of this historically traditional sector.
blog-why-businesses-cannot-ignore
Entrada de blog

Why businesses can’t ignore crypto agility - facing the facts before we’re in a post-quantum world

Today’s encryption algorithms, when pitted against quantum tools, will be considerably less resilient and leave huge amounts of data vulnerable as a result.
What are the common criteria for HSMs
Entrada de blog

What are the common criteria for hardware security modules (HSMs)?

All the critical banking and payment systems incorporate Hardware Security Modules (HSMs) for the protection of user information and business transactions.
bucking the trend
Entrada de blog

Bucking the trend – how cloud HSM services can help banks team up with fintech challengers

This article shows how FinTech firms can team up, with cloud-based HSMs as keystone.

¿En qué podemos ayudarle?

Hable con uno de nuestros especialistas y descubra cómo Utimaco puede ayudarle hoy mismo.
Ha seleccionado dos tipos diferentes de Download, por lo que necesita presentar formularios diferentes que puede seleccionar a través de las dos pestañas.

Su(s) solicitud(es) de Download:

    Al enviar el siguiente formulario, recibirá enlaces a las descargas seleccionadas.

    Su(s) solicitud(es) de Download:

      Para este tipo de documentos, es necesario verificar su dirección de correo electrónico. Recibirá los enlaces a las Download seleccionadas por correo electrónico después de enviar el siguiente formulario.

      Su colección de solicitudes de Download está vacía. Visite nuestra sección Download y seleccione recursos como fichas técnicas, White Paper, grabaciones de seminarios web y mucho más.

      Downloads