Blog

Entradas de blog

Press releases

Para encontrar entradas de blog con un tema específico, haga clic en una de las palabras clave más populares.

blog-how-entrust-datacard-pioneers-the-road-to-post-quantum-with-utimaco
Blog post

How Entrust Datacard pioneers the road to post-quantum with Utimaco - in spite of all uncertainties

Sandy Carielli faces all the unanswered questions, to advice Entrust Datacard's partners and customers on how to move forward in the context of post-quantum cryptography.
Payment HSM as a service
Blog post

NIST shortlisted 26 algorithms for focal post-quantum research

Since the development of quantum computing, some cryptographic algorithms have been compromised. Read here about current threats to crypto applications and how you can mitigate the security risks.
blog-how-samsung-prepares-devices
Blog post

How Samsung prepares devices sold today for a life in the post-quantum era

In this video blog, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center, describes his company’s strategy to develop products today which are prepared for the post quantum era.
blog-crypto-agile-hsms-by-utimaco
Blog post

Crypto-agile HSMs by Utimaco used in research for post-quantum cryptography

The need for crypto agility becomes more important. HSMs play a critical role in crypto agility and safeguarding digital keys as they provide the secure environment for executing the cryptographic algorithms to generate these keys.
blog-michele-mosca-quantum-computing
Blog post

Michele Mosca: Quantum computing will decimate the security infrastructure of the digital economy (video)

Michele Mosca explains why researchers all around the globe are ambitiously working on a new generation of cryptographic infrastructure and algorithms to withstand the quantum-enforced new generation of attack models.
blog-eidas-and-strong-customer-authentication
Blog post

eIDAS & strong customer authentication under PSD2

PSD2 or also named the 2nd Payment Services Directive is nationallaw in all EU member states. Read how to implement the new directive ans how to stay compliant.
blog-is-blockchain-fit-for-the-post-quantum-future
Blog post

Is blockchain fit for the post-quantum future?

Cryptography is one of the cornerstones of all blockchain infrastructures. A major advantage of blockchain is that its cryptography manges it virtually untamperable, with changes in the crypto being virtually impossible.
blog-key-generation-and-distribution
Blog post

Key generation and distribution considerations for PCI DSS Compliance

Payment Cards Industry Data Security Standard (PCI-DSS) compliance protects vulnerable customers who are unaware of the complex technologies behind the scenes.
Auditing blockchain and eIDAS
Blog post

Auditing blockchain and eIDAS

The anonymity provided by some blockchains is one of the largest attractions about this technology. For business adoption however it poses problems.
blog-pci-dss-technological-requirements
Blog post

PCI DSS technological requirements for Certified Devices

The payment card industry data security standard (PCI DSS) has a large security baseline that it requires for all financial institutions to comply with. Read in this article more about the PCI compliance.
blog-hsms-in-banks
Blog post

HSMs in banks - A case for a multi-sourcing strategy for critical tech infrastructure

Supply chain optimization has been one of the primary ways to squeeze a bit more efficiency out of business processes. This has increased risks as the logical conclusion of such unabated cost optimization is often a single sourcing strategy.
blog-utimaco-applied-crypto-symposium
Blog post

Utimaco Applied Crypto Symposium in the US 2018

Quantum computers will revolutionize many industries and will be powerful enough to break all commonly used public key cryptographic algorithms.

¿En qué podemos ayudarle?

Hable con uno de nuestros especialistas y descubra cómo Utimaco puede ayudarle hoy mismo.
Ha seleccionado dos tipos diferentes de Download, por lo que necesita presentar formularios diferentes que puede seleccionar a través de las dos pestañas.

Su(s) solicitud(es) de Download:

    Al enviar el siguiente formulario, recibirá enlaces a las descargas seleccionadas.

    Su(s) solicitud(es) de Download:

      Para este tipo de documentos, es necesario verificar su dirección de correo electrónico. Recibirá los enlaces a las Download seleccionadas por correo electrónico después de enviar el siguiente formulario.

      Descargas de Utimaco

      Visite nuestra sección de descargas y seleccione recursos como folletos, fichas técnicas, libros blancos y mucho más. Puede ver y guardar casi todos ellos directamente (pulsando el botón de descarga).

      Para algunos documentos, es necesario verificar su dirección de correo electrónico. El botón contiene un icono de correo electrónico.

      Download via e-mail

      Al hacer clic en dicho botón se abre un formulario en línea que le rogamos rellene y envíe. Puede recopilar varias descargas de este tipo y recibir los enlaces por correo electrónico simplemente enviando un formulario para todas ellas. Su colección actual está vacía.