Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

blog-is-blockchain-fit-for-the-post-quantum-future
Blog post

Is blockchain fit for the post-quantum future?

Cryptography is one of the cornerstones of all blockchain infrastructures. A major advantage of blockchain is that its cryptography manges it virtually untamperable, with changes in the crypto being virtually impossible.
blog-utimaco-applied-crypto-symposium
Blog post

Utimaco Applied Crypto Symposium in the US 2018

Quantum computers will revolutionize many industries and will be powerful enough to break all commonly used public key cryptographic algorithms.
what is crypto agility
Blog post

What is crypto-agility and how to achieve it?

Crypto-agility can be elaborated as the ability and aptitude of a system to promptly shift from the existing cryptographic algorithms and primitives to the newer and updated ones.
blog-eidas-regulation
Blog post

eIDAS regulation: do not make the wrong choice when you are picking your HSM

Advances in financial technology are transforming banking as we know it and this spark innovation is changing the approach of this historically traditional sector.
blog-why-businesses-cannot-ignore
Blog post

Why businesses can’t ignore crypto agility - facing the facts before we’re in a post-quantum world

Today’s encryption algorithms, when pitted against quantum tools, will be considerably less resilient and leave huge amounts of data vulnerable as a result.
What are the common criteria for HSMs
Blog post

What are the common criteria for hardware security modules (HSMs)?

All the critical banking and payment systems incorporate Hardware Security Modules (HSMs) for the protection of user information and business transactions.
Introductiuon into hsm
Blog post

Introduction to hardware security modules (HSM): “FIPS 140-2 tested and certified”

Learn about the requirements specified in the Federal Information Processing Standard (FIPS) PUB 140- 2 outline a total of 11 areas of design and implementation of products in applied cryptography.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0