Blog

Entradas de blog

Press releases

Para encontrar entradas de blog con un tema específico, haga clic en una de las palabras clave más populares.

 digital pattern
Entrada de blog

Post Quantum Cryptography: Different Angles to Address an Urgent Matter

In this article, we review post-quantum migration recommendations based on research by security experts from the NSA, BSI, ENISTA and ETSI.
On premise data security in retail
Entrada de blog

Cybersecurity In Retail Payments

This article explores the current state of cybersecurity in retail, the reasons why retailers are vulnerable to cyber crimes, and the various payment security challenges they endure.
Key management zero trust
Entrada de blog

Achieving Zero Trust with Right Key Lifecycle Management

Discover how to achieve zero trust with the right Identity Management and Data Encryption with the use of efficient and compliant Key Management.
skyscrapers
Entrada de blog

Quantum Computing for Banks and Financial Institutions - Transformative Opportunities or a Threat to the IT Security Infrastructure

In this blog, we explain how banks and financial institutions could leverage the opportunities of quantum computing.
 digital pattern
Entrada de blog

A Staged Approach of Migration to Quantum-Safe Schemes - An ETSI Perspective

This article featuring ETSI’s perspective is the fourth in a series of different perspectives on post quantum migration.
 digital pattern
Entrada de blog

Quantum Mitigation and Integration into Existing Protocols - an ENISA perspective

In this article, we focus on ENISA’s perspective on quantum mitigation and integration into existing protocols.
Manag keys virtually
Entrada de blog

Zero Trust with HSM - Secure Key Generation & Protection of Keys

This article explains why and how Hardware Security Modules are the best option for this requirement.
 digital pattern
Entrada de blog

Discussing NSA's Commercial National Security Algorithm Suite 2.0

Recently, the U.S. National Security Agency (NSA) briefed NSS operators, owners and vendors on what the future requirements are for quantum-resistant algorithms.
zero trust sign on lockers
Entrada de blog

Data Encryption & Access Management in ZeroTrust

In this article, we explore two vital concepts – Data Encryption and Access Management and how both are critical to a successful Zero Trust strategy.
laptop with bank and atm icons
Entrada de blog

What is an HSM-based Payment Server

This article explains what a payment HSM is, the need for it to be within PCI compliance under PCI Hardware Security Module (HSM), and the importance of being PCI-HSM-certified. 
IDC Studie Cybersecurity
Entrada de blog

Five Questions to Stefan Auerbach on the Business Value of Cybersecurity and What Actions to Take

This interview with Stefan Auerbach, CEO of Utimaco, was conducted by IDC, and was first published in the IDC Executive Brief: Cybersecurity in Germany, Austria, and Switzerland 2022.
Press Release
Entrada de blog

Risks of not having cybersecurity in a connected car

At Realsec by Utimaco, we are a cybersecurity company that offers solutions in this area, developing encryption solutions both for general purpose and for the financial sector, digital signature, time stamping, PKI solutions, cybersecurity in Blockchain and Internet of Things (IoT), etc.

¿En qué podemos ayudarle?

Hable con uno de nuestros especialistas y descubra cómo Utimaco puede ayudarle hoy mismo.
Ha seleccionado dos tipos diferentes de Download, por lo que necesita presentar formularios diferentes que puede seleccionar a través de las dos pestañas.

Su(s) solicitud(es) de Download:

    Al enviar el siguiente formulario, recibirá enlaces a las descargas seleccionadas.

    Su(s) solicitud(es) de Download:

      Para este tipo de documentos, es necesario verificar su dirección de correo electrónico. Recibirá los enlaces a las Download seleccionadas por correo electrónico después de enviar el siguiente formulario.

      Su colección de solicitudes de Download está vacía. Visite nuestra sección Download y seleccione recursos como fichas técnicas, White Paper, grabaciones de seminarios web y mucho más.

      Downloads

      0