To find blog posts with a specific topic, click on one of the most popular keywords.


All Blog posts

digital icons of humans

Identity Management in Zero Trust

Identity is at the core of the Zero Trust Model since it’s the gateway to corporate access and poses a major security risk.
women looking at a credit card

The EU Digital Operational Resilience Act (DORA) Will Mean Significant Changes for Financial Institutions and ICT Providers

The European Commission's legislation aims to create EU-wide laws to ensure the operational resilience of the financial services industry.
The digital lock

The Importance of Cybersecurity

The frequency of cyber-attacks is continuously increasing. Therefore, there is a need to implement reliable cybersecurity solutions and build awareness among employees to effectively manage and respond to cyber-attacks.
Applicability statement stromversorgung

Applicability Statement 4 für Stromversorgungsunternehmen in Deutschland

Umstellung der Marktkommunikation auf das sichere Verfahren AS4 mit der Smart Metering PKI und unter Einhaltung der kryptographischen Vorgaben des BSI.
zero trust architecture

Introduction to Zero Trust Architecture

Due to the exponential increase in cyber threats and attacks, Zero Trust Architecture (ZTA) has become the latest trend in enterprise cybersecurity.
digital certificate

eIDAS 2.0 - Roadmap, Toolbox, and The European Digital Identity Architecture

EUDI Wallets are mobile applications or cloud services that collect and store digital credentials and allow them to be used secretly and securely for numerous government and non-government use cases.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.