Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

Manufacturing & IoT
Blog post

Cybersecurity in the Vehicle Manufacturing Industry

As the manufacturing industry becomes smarter, the cybersecurity protocols used to protect connected IoT devices and components also need to adapt and be built in at the manufacturing level.
IDC Study industrial iot
Blog post

Quantum Computing in the IoT Industry: Opportunities and Threats

How to Leverage the Opportunities and Prepare for the Threats That Quantum Computers Could Bring to the IoT Industry
Digital ID
Blog post

eIDAS 2.0. Moving Closer - European Digital Identity Wallet (EDIW) and Pilot Implementation

The European Commission has now proceeded to test technical specifications for the Common Toolbox for European Digital Identity and a prototype of a Digital Identity Wallet.
PQC Mnufacturing
Blog post

Leveraging Quantum Computers in Manufacturing Industry: Opportunities and Threats

We explain how the manufacturing industry can leverage the opportunities that quantum computing provides while remaining mindful of the possible threats.
 digital pattern
Blog post

Post Quantum Cryptography: Different Angles to Address an Urgent Matter

In this article, we review post-quantum migration recommendations based on research by security experts from the NSA, BSI, ENISTA and ETSI.
On premise data security in retail
Blog post

Cybersecurity In Retail Payments

This article explores the current state of cybersecurity in retail, the reasons why retailers are vulnerable to cyber crimes, and the various payment security challenges they endure.
Key management zero trust
Blog post

Achieving Zero Trust with Right Key Lifecycle Management

Discover how to achieve zero trust with the right Identity Management and Data Encryption with the use of efficient and compliant Key Management.
skyscrapers
Blog post

Quantum Computing for Banks and Financial Institutions - Transformative Opportunities or a Threat to the IT Security Infrastructure

In this blog, we explain how banks and financial institutions could leverage the opportunities of quantum computing.
 digital pattern
Blog post

A Staged Approach of Migration to Quantum-Safe Schemes - An ETSI Perspective

This article featuring ETSI’s perspective is the fourth in a series of different perspectives on post quantum migration.
 digital pattern
Blog post

Quantum Mitigation and Integration into Existing Protocols - an ENISA perspective

In this article, we focus on ENISA’s perspective on quantum mitigation and integration into existing protocols.
Manag keys virtually
Blog post

Zero Trust with HSM - Secure Key Generation & Protection of Keys

This article explains why and how Hardware Security Modules are the best option for this requirement.
 digital pattern
Blog post

Discussing NSA's Commercial National Security Algorithm Suite 2.0 against Cryptanalytically Relevant Quantum Computers

Recently, the U.S. National Security Agency (NSA) briefed NSS operators, owners and vendors on what the future requirements are for quantum-resistant algorithms.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.