Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

blog-intelligent-banking
Blog post

Intelligent banking needs a cybersecurity edge

Advances in financial technology are transforming banking as we know it and this spark innovation is changing the approach of this historically traditional sector.
blog-the-higher-purpose-of-eidas
Blog post

The higher purpose of eIDAS: supporting the european digital single market

While it still presents a challenge to many businesses and government institutions, the greater idea behind eIDAS is to strive towards a true digital single market in Europe.
blog-local-vs-remote-signing
Blog post

Local vs. remote signing and sealing according to eIDAS

One of the eIDAS objectives is the creation of a European market for electronic trust services with the same legal status and validity as paper-based processes – consistently applied across all member states.
blog-why-businesses-cannot-ignore
Blog post

Why businesses can’t ignore crypto agility - facing the facts before we’re in a post-quantum world

Today’s encryption algorithms, when pitted against quantum tools, will be considerably less resilient and leave huge amounts of data vulnerable as a result.
Sole control of one’s signing keys under eIDAS
Blog post

Sole control of one’s signing keys under eIDAS

This blog post takes a look at the details of sole control. Which is the principle that ensures the signer – and no one else but the signer – has access to her/his signing key and can initiate a digital signature.
Quo vadis it-sa?
Blog post

Quo vadis it-sa?

it-sa is considered one of Europe´s largest IT security fairs, has grown tremendously and attracts more and more foreign guests as well.
HSM to cloud geobridge
Blog post

Moving Your HSMs To The Cloud

Enterprises, especially those who manage sites in multiple geographical locations, have the most to gain by centralizing and virtualizing their HSM resources.
What are the common criteria for HSMs
Blog post

What are the common criteria for hardware security modules (HSMs)?

All the critical banking and payment systems incorporate Hardware Security Modules (HSMs) for the protection of user information and business transactions.
pci hsm certificate
Blog post

What is the PCI-HSM certification?

As new threats emerge on a daily basis, it is critical for CIOs, CISOs, and IT Managers to ensure they remain diligent when it comes to safeguarding their environments.
HSM as a service
Blog post

PCI DSS requirements for building and maintaining a secure network and systems

When building and then subsequently maintaining a secure payment network, the Payment Card Industry Data Security Standard (#PCIDSS) recommends that 12 security requirements be met to secure payment data.
blockchain sunset
Blog post

Blockchain - the next 10 years

A decade ago, Satoshi Nakamoto published the bitcoin whitepaper, the spark that started the blockchain fire engulfing us today. Since then the options available and uses of blockchain technology have dramatically expanded.
bucking the trend
Blog post

Bucking the trend – how cloud HSM services can help banks team up with fintech challengers

This article shows how FinTech firms can team up, with cloud-based HSMs as keystone.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.