Blog

ブログ

特定のトピックのブログ投稿を検索するには、最も人気のあるキーワードのいずれかをクリックします。

Manag keys virtually
ブログ記事

Zero Trust with HSM - Secure Key Generation & Protection of Keys

This article explains why and how Hardware Security Modules are the best option for this requirement.
 digital pattern
ブログ記事

Discussing NSA's Commercial National Security Algorithm Suite 2.0

Recently, the U.S. National Security Agency (NSA) briefed NSS operators, owners and vendors on what the future requirements are for quantum-resistant algorithms.
laptop with bank and atm icons
ブログ記事

What is an HSM-based Payment Server

The Banking and financial services industry is challenged by PSD2. On top of this, they need to manage Identity and access management, cryptographic key management, use blockchains, go to the cloud and stay compliant.
IDC Studie Cybersecurity
ブログ記事

Five Questions to Stefan Auerbach on the Business Value of Cybersecurity and What Actions to Take

This interview with Stefan Auerbach, CEO of Utimaco, was conducted by IDC, and was first published in the IDC Executive Brief: Cybersecurity in Germany, Austria, and Switzerland 2022.
digital certificate
ブログ記事

eIDAS 2.0 - Roadmap, Toolbox, and The European Digital Identity Architecture

EUDI Wallets are mobile applications or cloud services that collect and store digital credentials and allow them to be used secretly and securely for numerous government and non-government use cases.
 digital pattern
ブログ記事

Summarizing BSI's View on Quantum Technologies and Quantum-Proof Cryptography

This article discusses BSI’s view on quantum technologies and quantum-proof cryptography.
NIST digital identity
ブログ記事

NIST Digital Identity Guidelines & Identity Proofing - Why Using A Public Key Infrastructure Is A Key Requirement

In this article, we outline key requirements from NIST and how the use of a Public Key Infrastructure becomes a necessary requirement in order to adhere to these Guidelines.
Woman typing on Computer
ブログ記事

Securing The Innovative Digital Payments Of Today

Progress in payments includes accelerating seismic shifts to digital transactions and generating unbounded opportunities for innovation.
Authentication
ブログ記事

Authentication in Zero Trust

Authentication in Zero Trust is a critical challenge since it is the first phase before establishing trust and granting access.
Automotive Trust Suite
ブログ記事

How Secure are connected vehicles?

Given the increasing complexity of the connected vehicle, It is critical to protect smart components and devices from the time they are manufactured until the end of their lifecycle.
HSM as a root of trust
ブログ記事

Understanding the Role of the HSM as the Root of Trust

HSMs due to their cryptographic ability to securely generate and store keys in a secure, tamper-resistant/evident environment – act as the Root of Trust.
spooky cybersecurity stories
ブログ記事

6 Spooky Cybersecurity Stories That Will Haunt Your CISO

We examine the consequences of some of the most frightening cyberattacks and how they could have been avoided.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download collection:

    You will be provided with links for your selected downloads directly after submitting below form.

    Your download collection:

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your download collection is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more.

      Downloads
      0