Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

Michele Mosca (University of Waterloo) - Ramping Up The PQC Transition Process with Internal and External Stakeholders
Blog post

Michele Mosca (University of Warerloo) - Ramping Up The PQC Transition Process with Internal and External Stakeholders

Michele Mosca - Ramping Up the PQC Transition Process with Internal and External Stakeholders. CIOs and CISOs need to know how to get prepared for the post quantum era.
Lily Chen (NIST) - Getting Prepared for the Migration towards PQC
Blog post

Lily Chen (NIST) - Getting Prepared for the Migration towards PQC

Lily Chen (NIST), the manager of the Crypto Technology Group at NIST, advises CIOs and CISOs to get prepared for the migration towards PQC soon.
Michael Engel (Diebold-Nixdorf) - Encrypting Retail Banking Services for End-to-End Security (video)
Blog post

Michael Engel (Diebold-Nixdorf) - Encrypting Retail Banking Services for End-to-End Security (video)

In this video, Michael Engel explains, why he is partners with Utimaco for that critical element of encryption technology in the financial services across the globe.
blog-5th-applied-crypto-symposium-silicon-valley
Blog post

5th Applied Crypto Symposium in Silicon Valley - an Executive Summary

At the 5th Applied Crypto Symposium in Silicon Valley, thought leaders from standardization organizations, global vendors,  consultancy firms & leading financial institutes discussed cyber security risks of post quantum computing.
blog-nists-hybrid-mode-approach-to-post-quantum-computing
Blog post

NIST's Hybrid Mode Approach to Post-Quantum Computing - why crypto agility is crucial

The importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.
Puzzle piece missing
Blog post

Why is the choice of the right HSM prerequisite for a crypto agile architecture

Organizations have to put serious consideration into the future of cryptography. This is why the choice of the right Hardware Security Module is a prerequisite for a crypto-agile architecture.
blog-state-of-symmetric-hash-algorithms-after-quantum-computing
Blog post

State of Symmetric & Hash Algorithms after Quantum Computing

The importance of cryptography is increasing. The formalization of quantum computing platforms poses serious threats to the cryptographic algorithms. Be informed about the omplications of quantum computing on the present cryptography.
blog-making-blockchain-technology-secure-and-auditable
Blog post

Making Blockchain Technology Secure and Auditable

Modern blockchain technology is evolving. The transfer of trusted data to the blockchain technology makes it essential for blockchains to be implemented in a secure manner.
blog-trends-and-observations-from-rsa-2019
Blog post

Trends and observations from RSA Conference San Francisco 2019

Utimaco attended the RSA Conference in 2019 and we made some observations regarding the changes that are expected in the cyber-security industry.
blog-crypto-agility
Blog post

Crypto agility - How to determine your timeline for post-quantum preparation

There is a significant uncertainty when it comes to the impact of quantum computing on modern cryptography. Michele Mosca has offered a theorem that may be the key to successfully determining your path to post-quantum preparation.
blog-bank-of-lithuania
Blog post

Bank of Lithuania opens up their payment infrastructure – disrupting the European financial market

Martynas Rajunčius describes the steps that helped the Bank of Lithuania to open up their infrastructure to payment services for banks and non-banks under PSD2 frame.
blog-how-entrust-datacard-pioneers-the-road-to-post-quantum-with-utimaco
Blog post

How Entrust Datacard pioneers the road to post-quantum with Utimaco - in spite of all uncertainties

Sandy Carielli faces all the unanswered questions, to advice Entrust Datacard's partners and customers on how to move forward in the context of post-quantum cryptography.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0