Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

Digital Lock
Blog post

Maximize Your HSM: Extend Its Use for Multi-Factor Authentication

HSMs can also secure the keys used to manage credentials for multi-factor authentication (MFA).
Encryption
Blog post

Post Quantum Cryptography News: NIST announces HQC as fifth PQC algorithm to be standardized

On March 11, 2025, NIST announced the selection of HQC as a new Post-Quantum Cryptography (PQC) algorithm for standardization.
Fintech
Blog post

The Role of Payment HSMs in Overcoming FinTech Challenges

This blog covers the three top FinTech challenges and how Payment HSMs help overcome them.
PQC
Blog post

Quantum Key Distribution vs. Post Quantum Cryptography

What’s the better way to achieve quantum security?
Digital Lock
Blog post

Data Security in 2024: Why File and Folder Encryption Is Your Frontline Defense

Here’s how LAN Crypt File and Folder Encryption can help you stay ahead of the game, leveraging Gartner’s most urgent insights on the frontlines of data security.
Digital Wallet Teaser
Blog post

eIDAS 2.0 and the EU Digital Identity Wallet - Status Quo

The European Union is on the brink of a digital transformation milestone with the introduction of the EU Digital Identity Wallet.
robotic hand holding a warn sign
Blog post

2025 Cybersecurity Trends – Staying on top of AI, PQC, and Confidential Computing

In this blog post, we’ll explore five emerging cybersecurity trends and topics poised to gain momentum in 2025.
CKM
Blog post

Cryptographic Key Management in 2025: The Most Important Trends You Need to Know

We have identified crucial trends that will influence the crypto key management landscape. In this blog post, we will share the top three.
White House
Blog post

Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity - Key Takeaways on PQC

In this blog, we explore the Executive Order's PQC-related strategies, its implementation timeline, and best practices for fulfillment of requirements.
Digital Lock
Blog post

Your Data’s Future Depends on It: Why HSMs and KMS Are the Bedrock of Cybersecurity

Here’s why Utimaco’s General Purpose HSMs and Key Management solutions are the better choice – backed by insights from Gartner.
Data Security
Data Security
Blog post

Data Security as a Service – Important Trends for 2025

Learn what exactly is Data Security as a Service, and why is it poised to dominate the future of digital security.
Payments
Blog post

Payment HSM Certifications Explained

This blog explores the key certifications for Payment HSMs, their importance, and how they help organizations navigate the complex world of secure digital payments.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.