Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

somebody is clicking on the phone
Blog post

Understanding the Role of Hardware Security Modules in Public Key Infrastructure (PKI)

Public key infrastructure protects communications between users and website servers. The underlying Hardware Security Modules are the root of trust which protect PKI from being breached.
Digital Cloud Network
Blog post

Achieve Robust Cloud Security: Implementing the Gold Standard for all Cloud Deployment Models

Implementing the Gold Standard for all Cloud Deployment Models
POS
Blog post

Point-of-Sale (POS) Security: Utilizing Cryptographic Keys for Payment Security in Retail

Point-of-sale (POS) terminals are the essential backbone of modern businesses, from bustling restaurants to dynamic retail merchants.
NIS2 compliance Teaser
Blog post

The role of cryptography and encryption in NIS2

The NIS2 Directive aims to improve risk management, incident response, and information sharing among essential service providers and digital infrastructure.
Data protection
Blog post

Wie Datenverschlüsselung die Compliance auf dem deutschen Markt sicherstellt: Navigation durch VS-NfD, TISAX und KHZG-Anforderungen

In diesem Artikel erläutern wir die Bedeutung der Datei- und Ordnerverschlüsselung und wie sie dazu beiträgt, verschiedene deutsche Vorschriften einzuhalten.
mobile payment with a credit card
Blog post

Navigating PCI PIN Security Requirements

PCI PIN Security Requirements outlines the procedures and equipment required to achieve the highest level of encryption.
mobile payment with a credit card
Blog post

Understanding Payments Compliance: FIPS and PCI Standards

We explore two key standards—FIPS and PCI—that are essential for payments compliance and discuss their relevance within the industry.
a digital cloud
Blog post

Adopting Data Security as a Service: Key considerations when choosing a vendor

In this article, we explore the benefits of DSaaS and provide helpful insights on how to successfully implement it.
Payment Key Management
Blog post

Key Management System Migration: Ensuring Security Beyond End of Life

Reliable cryptographic Key Management is crucial for the security of digital data, whether stored on-premises or in the cloud.
Emergency communications and public warnings
Blog post

8 Steps to Establish a Cell Broadcast-Based Public Warning System

This blog walks you through seven key steps to successfully establish a cell broadcast-based public warning system (PWS), highlighting critical considerations at each stage.
 digital pattern
Blog post

NIST’s Post-Quantum Cryptography Standards: Elevating the Need for SBOM and CBOM

In this blog post, we’ll explore the complexities of integrating quantum-safe algorithms across the software supply chain.
a digital lock
Blog post

A Comprehensive guide to navigating data encryption across EU regulations

We explain the importance of file and folder encryption and how it helps to comply with various EU regulations.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.