Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

pqc general
Blog post

Types of Post Quantum Cryptography Public Key Schemes and what to expect from the NIST Standardization Process

We're looking at the type of cryptography based on certain “hard mathematical problems” that are considered secure against quantum computers.
HSM as a root of trust
Blog post

How HSMs support secure multi-tenancy?

To secure a large number of clients within an HSM, multi-tenant HSM architectures are getting popular as they promise robust performance.
File and Folder Encryption as a Service
Blog post

Understanding the Importance of Encryption: Use Cases Across Various Regulations

Explore the critical role of encryption in data protection and regulatory compliance.
 digital pattern
Blog post

Discussing NSA's Commercial National Security Algorithm Suite 2.0

Recently, the U.S. National Security Agency (NSA) briefed NSS operators, owners and vendors on what the future requirements are for quantum-resistant algorithms.
a digital key
Blog post

Top 5 Considerations for Choosing a Vendor in Key Management System Migration

Migrating to a new key management system (KMS) can offer enhanced security, compliance, and operational efficiency.
Data protection
Blog post

5 Wichtige Aspekte für die Datensicherheit gemäß VS-NfD

Die Digitalisierung Ihrer Verwaltung erfordert digitale Sicherheitslösungen.
post quantum cryptography
Blog post

Stateful Hash-Based Signature Schemes – Hidden Champions of Post Quantum Cryptography

A light introduction to stateful hash-based signatures, their suitability for quantum-resistance and how to solve the state handling challenge.
zero trust sign on lockers
Blog post

Navigating Security: Understanding The Zero Trust Maturity Model

Zero Trust Maturity Model – a roadmap for organizations to fortify their defenses and embrace a proactive approach to security.
RSA 2024 promo graphic
Blog post

RSA 2024: The latest updates from cybersecurity’s biggest conference

The stand-out topics and industry trends, based on the presentations and the general talk around the conference.
defense
Blog post

The Triple Defense: Zero Trust, TLS with Mutual Authentication, and HSMs Join Forces

These joined forces are changing the way we protect our digital assets, ensuring that trust is earned, not assumed.
pqc general
Blog post

Preparing for the Post Quantum World: Key Insights for Cybersecurity Professionals

As quantum computers become capable of breaking asymmetric cryptographic algorithms that underpin our digital security, there is a need for new, quantum-resistant standards.
HSM shield
Blog post

11 Reasons Why Utimaco GP HSMs Are The Better Choice

We continuously innovate to provide products, solutions, and services that uphold the highest levels of security and certification.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.