Blog

Entradas de blog

Press releases

Para encontrar entradas de blog con un tema específico, haga clic en una de las palabras clave más populares.

a digital cloud with a lock
Blog post

Ensuring Secure Migration to Multi-Cloud Environments

We dive into best practices for reducing security risks, helping to safeguard your organization's valuable data and resources.
cloud
Blog post

Key Management Migration to the Cloud - Basics explained

We explore the essential methods for deciding on the right Key Management Solution, to ensure control and security over your sensitive data in the cloud.
digital mark
Blog post

NIST’s final PQC standards are here – What you need to know

After years of rigorous evaluation and public feedback, these standards are now ready for use, signaling a new era in cryptography designed to withstand the potential threats posed by quantum computing.
a women typing on laptop
Blog post

The role of TLS/SSL certificates and Certificate Authorities for online communication and identities

We explore how SSL/TLS certificates and CAs work together to create a secure online environment, the historical evolution of web security, and the potential risks when this trust is compromised.
Lawful interception Test Suite (LITS)
Blog post

The role of lawful interception activities in intelligence services, law enforcement agencies and their monitoring centers

We explore the requirements and significance of LI activities, highlighting their indispensable role in modern policing and intelligence operations.
a digital sign
Blog post

Choosing The Right Cybersecurity Tools To Comply With The Digital Operational Resilience Act (DORA)

Choosing The Right Cybersecurity Tools To Comply With The Digital Operational Resilience Act (DORA)
Trsut as a service teaser
Blog post

The As a Service Business Model - A New Way to Consume Cybersecurity

Fully managed as-a-service offerings are now at the forefront of the cybersecurity landscape.
Utimaco and InfoSec Global
Blog post

The Looming Quantum Migration: Why Cryptography Inventory is Essential

The cryptography landscape is on the verge of a seismic shift. The rise of quantum computing threatens to render these classical algorithms obsolete.
pqc general
Blog post

Types of Post Quantum Cryptography Public Key Schemes and what to expect from the NIST Standardization Process

We're looking at the type of cryptography based on certain “hard mathematical problems” that are considered secure against quantum computers.
HSM as a root of trust
Blog post

How HSMs support secure multi-tenancy?

The use of HSMs for the security of business applications has been mandatory. To secure a large number of clients within an HSM, multi-tenant HSM architectures are getting popular as they promise robust performance.
File and Folder Encryption as a Service
Blog post

Comprendiendo la importancia del cifrado: Casos de uso para diversas regulaciones

Explore el papel fundamental del cifrado en la protección de datos y el cumplimiento de la normativa.
 digital pattern
Blog post

Discussing NSA's Commercial National Security Algorithm Suite 2.0 against Cryptanalytically Relevant Quantum Computers

Recently, the U.S. National Security Agency (NSA) briefed NSS operators, owners and vendors on what the future requirements are for quantum-resistant algorithms.

¿En qué podemos ayudarle?

Hable con uno de nuestros especialistas y descubra cómo Utimaco puede ayudarle hoy mismo.
Ha seleccionado dos tipos diferentes de Download, por lo que necesita presentar formularios diferentes que puede seleccionar a través de las dos pestañas.

Su(s) solicitud(es) de Download:

    Al enviar el siguiente formulario, recibirá enlaces a las descargas seleccionadas.

    Su(s) solicitud(es) de Download:

      Para este tipo de documentos, es necesario verificar su dirección de correo electrónico. Recibirá los enlaces a las Download seleccionadas por correo electrónico después de enviar el siguiente formulario.

      Descargas de Utimaco

      Visite nuestra sección de descargas y seleccione recursos como folletos, fichas técnicas, libros blancos y mucho más. Puede ver y guardar casi todos ellos directamente (pulsando el botón de descarga).

      Para algunos documentos, es necesario verificar su dirección de correo electrónico. El botón contiene un icono de correo electrónico.

      Download via e-mail

      Al hacer clic en dicho botón se abre un formulario en línea que le rogamos rellene y envíe. Puede recopilar varias descargas de este tipo y recibir los enlaces por correo electrónico simplemente enviando un formulario para todas ellas. Su colección actual está vacía.