Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

device attestation
Blog post

Streamlining Device Security with Device Attestation

Device attestation solutions emerge as indispensable tools, providing a shield against unauthorized access, data breaches, and malicious activities.
IoT
Blog post

Hindernis oder Treiber: Ist Cybersicherheit zu Recht ein IIoT-Bremser oder ist IIoT der Weg, um industrielle Cybersecurity zu verbessern?

Zentrales Ergebnis der IDC-Studie: Aktuell setzen in Deutschland nur 3 von 10 Industrieunternehmen aktiv IIoT-Projekte um.
blog-how-to-select-an-hsm
Blog post

How to select an HSM vendor

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
a machine with icons around
Blog post

Understanding the Role of Hardware Security Modules in Digital Identities for Machines

Humans are not the only ones that need the security of a digital identity. Machines used in digital transactions are a target for hackers, necessitating the protection that digital identities provide for all stakeholders in order to prevent security breaches.
Understanding Supply Chain Attacks - What You Need to Know
Blog post

Understanding Supply Chain Attacks - What You Need to Know

Supply chain attacks are nothing new. However, these attacks have become more organized since the early part of 2020. Now, cybercriminals have turned their focus to suppliers versus organizations to make a far greater impact with damages.
Understanding Supply Chain Attacks - How to Protect Your Supply
Blog post

Understanding Supply Chain Attacks - How to Protect Your Supply

Supply chain attacks threatened the interconnectedness of global markets. It is common for multiple customers to rely on the same supplier. Therefore, a single cyberattack could potentially have a large-scale national or cross-border impact.
blog-remote-management-in-the-age-of-global-disruptions
Blog post

Remote Management in the Age of Global Disruptions

As the world comes to terms with the COVID-19 pandemic and social distancing becomes a focal point in flattening the curve, businesses around the globe are confronted with challenges associated with remote management.
blog-afd-fleet-cards-transition-from-3des-to-aes
Blog post

AFD Fleet Cards - Transition from 3DES to AES

In this article we will focus on fleet cards issued by banks and/or follow a payment card association scheme (Visa, MasterCard, etc.) and the necessary transition from 3DES to AES encryption.
blog-emv-for-fleet-cards
Blog post

EMV for Fleet Cards - Does it make sense for AFD Fuel Cards?

EMV could reshape the future of fleet & fuel cards. This can help managers grow and strengthen their fleets’ overall performance.
blog-fleet-cards-fuel-cards-and-afd
Blog post

Fleet Cards, Fuel Cards, and AFD - Key Answers on PCI Compliance, Crypto-Security and the EMV shift in October 2020

Today, Automatic Fuel Dispenser fraud is a sad reality. Gas pumps are impacted by skimmers, cloned fuel cards, and other schemes. This forces fuel merchants to adopt chip technology as a way to prevent counterfeit frauds. 
blog-how-blockchain-allows-car-manufacturers
Blog post

How Blockchain Allows Car Manufacturers to Create Digital Passports

This article explains how blockchain technologies can allow car manufacturers to offer irrefragable digital passports for the buyers and owners of the vehicles they sell.
blog-how-blockchain-disrupts-automotive
Blog post

How Blockchain Disrupts the Automotive Industry

It is estimated that around 62 percent of the global automotive industry will use blockchain technologies as early as 2021. Many car manufacturers are currently investing in Distributed Ledgers Technologies (DLT) projects.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0