Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

 digital pattern
Blog post

NIST’s Post-Quantum Cryptography Standards: Elevating the Need for SBOM and CBOM

In this blog post, we’ll explore the complexities of integrating quantum-safe algorithms across the software supply chain.
blue background
Blog post

Defend Your Data: Essential Steps to Combat Quantum Computing Risks

The future of cybersecurity faces a monumental challenge: quantum computing.
digital mark
Blog post

NIST’s final PQC standards are here – What you need to know

After years of rigorous evaluation and public feedback, these standards are now ready for use, signaling a new era in cryptography designed to withstand the potential threats posed by quantum computing.
pqc general
Blog post

Types of Post Quantum Cryptography Public Key Schemes and what to expect from the NIST Standardization Process

We're looking at the type of cryptography based on certain “hard mathematical problems” that are considered secure against quantum computers.
post quantum cryptography
Blog post

Stateful Hash-Based Signature Schemes – Hidden Champions of Post Quantum Cryptography

A light introduction to stateful hash-based signatures, their suitability for quantum-resistance and how to solve the state handling challenge.
pqc general
Blog post

Preparing for the Post Quantum World: Key Insights for Cybersecurity Professionals

As quantum computers become capable of breaking asymmetric cryptographic algorithms that underpin our digital security, there is a need for new, quantum-resistant standards.
Keymanagement for walltes, blockchain
Blog post

Blockchain at Risk: Can Quantum Computing Break Blockchain?

Explore quantum computing's disruptive potential across industries and its challenge to traditional cryptographic systems, including blockchain.
Post Quantum Cryptography
Blog post

The Quantum Revolution vs. Cybersecurity: Ensuring Resilience with Post Quantum Cryptography

Navigating the quantum leap in the cybersecurity domain demands a proactive and agile approach towards quantum-resistant cryptography.
light-blurred road
Blog post

How to Leverage the Opportunities and Prepare for the Threats of Quantum Computers in the Automotive Industry

We dive into the opportunities that quantum computing offers automotive industry.
Early Warning for Regional Government
Blog post

How to Leverage the Opportunities and Prepare for the Threats of Quantum Computers in the Government Sector

Discover the transformative potential of quantum computing in the government sector. Harness opportunities, tackle threats, and ensure cybersecurity.
Energy & Utilities
Blog post

How to Leverage the Opportunities and Prepare for the Threats of Quantum Computers in the Energy & Utilities Industry

Quantum computing has emerged as a game-changing technology with the potential to revolutionize various industries.
IDC Study industrial iot
Blog post

Quantum Computing in the IoT Industry: Opportunities and Threats

How to Leverage the Opportunities and Prepare for the Threats That Quantum Computers Could Bring to the IoT Industry

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.