Blog

ブログ

Press releases

特定のトピックのブログ投稿を検索するには、最も人気のあるキーワードのいずれかをクリックします。

device attestation
ブログ記事

Streamlining Device Security with Device Attestation

Device attestation solutions emerge as indispensable tools, providing a shield against unauthorized access, data breaches, and malicious activities.
IoT
ブログ記事

Hindernis oder Treiber: Ist Cybersicherheit zu Recht ein IIoT-Bremser oder ist IIoT der Weg, um industrielle Cybersecurity zu verbessern?

Zentrales Ergebnis der IDC-Studie: Aktuell setzen in Deutschland nur 3 von 10 Industrieunternehmen aktiv IIoT-Projekte um.
blog-how-to-select-an-hsm
ブログ記事

How to select an HSM vendor

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
a machine with icons around
ブログ記事

Understanding the Role of Hardware Security Modules in Digital Identities for Machines

Humans are not the only ones that need the security of a digital identity. Machines used in digital transactions are a target for hackers, necessitating the protection that digital identities provide for all stakeholders in order to prevent security breaches.
Understanding Supply Chain Attacks - What You Need to Know
ブログ記事

Understanding Supply Chain Attacks - What You Need to Know

Supply chain attacks are nothing new. However, these attacks have become more organized since the early part of 2020. Now, cybercriminals have turned their focus to suppliers versus organizations to make a far greater impact with damages.
Understanding Supply Chain Attacks - How to Protect Your Supply
ブログ記事

Understanding Supply Chain Attacks - How to Protect Your Supply

Supply chain attacks threatened the interconnectedness of global markets. It is common for multiple customers to rely on the same supplier. Therefore, a single cyberattack could potentially have a large-scale national or cross-border impact.
blog-remote-management-in-the-age-of-global-disruptions
ブログ記事

Remote Management in the Age of Global Disruptions

As the world comes to terms with the COVID-19 pandemic and social distancing becomes a focal point in flattening the curve, businesses around the globe are confronted with challenges associated with remote management.
blog-afd-fleet-cards-transition-from-3des-to-aes
ブログ記事

AFD Fleet Cards - Transition from 3DES to AES

In this article we will focus on fleet cards issued by banks and/or follow a payment card association scheme (Visa, MasterCard, etc.) and the necessary transition from 3DES to AES encryption.
blog-emv-for-fleet-cards
ブログ記事

EMV for Fleet Cards - Does it make sense for AFD Fuel Cards?

EMV could reshape the future of fleet & fuel cards. This can help managers grow and strengthen their fleets’ overall performance.
blog-fleet-cards-fuel-cards-and-afd
ブログ記事

Fleet Cards, Fuel Cards, and AFD - Key Answers on PCI Compliance, Crypto-Security and the EMV shift in October 2020

Today, Automatic Fuel Dispenser fraud is a sad reality. Gas pumps are impacted by skimmers, cloned fuel cards, and other schemes. This forces fuel merchants to adopt chip technology as a way to prevent counterfeit frauds. 
blog-how-blockchain-allows-car-manufacturers
ブログ記事

How Blockchain Allows Car Manufacturers to Create Digital Passports

This article explains how blockchain technologies can allow car manufacturers to offer irrefragable digital passports for the buyers and owners of the vehicles they sell.
blog-how-blockchain-disrupts-automotive
ブログ記事

How Blockchain Disrupts the Automotive Industry

It is estimated that around 62 percent of the global automotive industry will use blockchain technologies as early as 2021. Many car manufacturers are currently investing in Distributed Ledgers Technologies (DLT) projects.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more.

      Downloads
      0