Blog

General purpose HSM

locker icons
Blog

Understanding the Role of Hardware Security Modules in Symmetric Key Encryption

Organizations face an ever-present risk of data breaches as digital transformations continue to flourish in the business scape. Encryption plays a critical part in mitigating business risks and keeping data safe.
somebody is clicking on the phone
Blog

Understanding the Role of Hardware Security Modules in Public Key Infrastructure (PKI)

In today’s digital age, authenticating users, devices and facilitating the secure electronic transfer of information for a range of industries such as financial services, e-commerce, health, and IoT is an imperative when exchanging data to build trust and secure the business environment.
Blog Gartner Top Security and Risk Trends
Blog

Top Security and Risk Trends implications on Cybersecurity Architecture

Gartner recently published their 2021 cyber security report that shows important risk trends in cybersecurity. This article discusses what implications these trends have on cybersecurity architecture.
Lily Chen (NIST) - Getting Prepared for the Migration towards PQC
Blog

Lily Chen (NIST) - Getting Prepared for the Migration towards PQC

Lily Chen (NIST), the manager of the Crypto Technology Group at NIST, advises CIOs and CISOs to get prepared for the migration towards PQC soon.
blog-what-is-an-hsm-based-payment-server
Blog

What is an HSM-based Payment Server

The Banking and financial services industry is challenged by PSD2. On top of this, they need to manage Identity and access management, cryptographic key management, use blockchains, go to the cloud and stay compliant.
blog-state-of-symmetric-hash-algorithms-after-quantum-computing
Blog

State of Symmetric & Hash Algorithms after Quantum Computing

The importance of cryptography is increasing. The formalization of quantum computing platforms poses serious threats to the cryptographic algorithms. Be informed about the omplications of quantum computing on the present cryptography.
blog-making-blockchain-technology-secure-and-auditable
Blog

Making Blockchain Technology Secure and Auditable

Modern blockchain technology is evolving. The transfer of trusted data to the blockchain technology makes it essential for blockchains to be implemented in a secure manner.
blog-eidas-advantages-of-qes-compared-to-aes-and-where-qes-is-vital
Blog

eIDAS: The Advantages of QES as compared to AES

Know the main requirements that must be met to be complient for Advanced and Qualified Electronic Signatures with eIDAS electronic transactions in the European internal market.
blog-secure-transactions-with-eidas
Blog

Secure Transactions with eIDAS

Under eIDAS, the EU aims to facilitate cross-border digital transactions and pave the way for a Digital Single Market. Qualified electronic signatures and seals play a decisive role with this goal. Read in our article how to benefit from eIDAS.
blog-trends-and-observations-from-rsa-2019
Blog

Trends and observations from RSA Conference San Francisco 2019

Utimaco attended the RSA Conference in 2019 and we made some observations regarding the changes that are expected in the cyber-security industry.
blog-how-high-trust-industries
Blog

How high-trust industries are benefiting from e-signatures

Using an e-signature solution with a Hardware Security Module (HSM) ensures that cryptographic keys and digital identities are secured centrally .
blog-crypto-agility
Blog

Crypto agility - How to determine your timeline for post-quantum preparation

There is a significant uncertainty when it comes to the impact of quantum computing on modern cryptography. Michele Mosca has offered a theorem that may be the key to successfully determining your path to post-quantum preparation.