Use case

Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

blog-an-introduction-to-the-regulatory-technical-standards-part-2
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 2: PSD2

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-1
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 1: eIDAS

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-the-pci-pts-hsm-v1-expires-guidelines
Blog post

The PCI PTS HSM v1 expires - Guidelines for the Transition Towards v3

HSMs are importand for enterprises for the protection of clients and business transactions. This article enlightens the expiry of version 1.0 of the PCI PTS HSM validation and the latest standard available version 3.0.
blog-eidas-psd2-the-new-payments-industry-paradigm-in-europe
Blog post

eiDAS & PSD2 - The New Payments Industry Paradigm in Europe

The Revised Payment Services Directive (PSD2) is poised to revolutionize the payment services industry. When it comes to payment transactions, the key elements of Strong Customer Authentication must be achieved.
blog-open-banking-the-3-main-focus-areas-for-banks-and-fintech
Blog post

Open Banking  - The 3 Main Focus Areas for Banks and FinTech

2019 has set the stage for the next round of the match-up between Banks and FinTechs and the requirements for Strong Customer Authentication will come into play.
blog-benefits-of-the-atalla-key-block
Blog post

The Benefits of the Atalla Key Block

HSMs use key block structures as basic structures to achieve secure key management. Read about the Atalla Key Block to know more about principles and details why protecting keys is so important.
Puzzle piece missing
Blog post

Why is the choice of the right HSM prerequisite for a crypto agile architecture

Organizations have to put serious consideration into the future of cryptography. This is why the choice of the right Hardware Security Module is a prerequisite for a crypto-agile architecture.
blog-pci-dss-physical-security-requirements-for-hsms
Blog post

PCI DSS - Physical Security Requirements for HSMs - Utimaco

This article summarized and highlighted the 8 core physical security standards for HSMs as per the directions of PCI SSC & PCI DSS.
blog-beyond-just-payments-psd2s-impact-beyond-the-payments-industry
Blog post

Beyond just Payments - PSD2’s impact beyond the Payments Industry

PSD2 is touted as the biggest game changer for the payments industry. PSD2 gives customers more control over their data and options to choose from different service providers.
blog-state-of-symmetric-hash-algorithms-after-quantum-computing
Blog post

State of Symmetric & Hash Algorithms after Quantum Computing

The importance of cryptography is increasing. The formalization of quantum computing platforms poses serious threats to the cryptographic algorithms. Be informed about the omplications of quantum computing on the present cryptography.
blog-making-blockchain-technology-secure-and-auditable
Blog post

Making Blockchain Technology Secure and Auditable

Modern blockchain technology is evolving. The transfer of trusted data to the blockchain technology makes it essential for blockchains to be implemented in a secure manner.
blog-eidas-advantages-of-qes-compared-to-aes-and-where-qes-is-vital
Blog post

eIDAS: The Advantages of QES as compared to AES

Know the main requirements that must be met to be complient for Advanced and Qualified Electronic Signatures with eIDAS electronic transactions in the European internal market.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.