Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

Encryption
Blog post

Post Quantum Cryptography News: NIST announces HQC as fifth PQC algorithm to be standardized

On March 11, 2025, NIST announced the selection of HQC as a new Post-Quantum Cryptography (PQC) algorithm for standardization.
Digital Lock
Blog post

Data Security in 2024: Why File and Folder Encryption Is Your Frontline Defense

Here’s how LAN Crypt File and Folder Encryption can help you stay ahead of the game, leveraging Gartner’s most urgent insights on the frontlines of data security.
Digital Wallet Teaser
Blog post

eIDAS 2.0 and the EU Digital Identity Wallet - Status Quo

The European Union is on the brink of a digital transformation milestone with the introduction of the EU Digital Identity Wallet.
robotic hand holding a warn sign
Blog post

2025 Cybersecurity Trends – Staying on top of AI, PQC, and Confidential Computing

In this blog post, we’ll explore five emerging cybersecurity trends and topics poised to gain momentum in 2025.
White House
Blog post

Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity - Key Takeaways on PQC

In this blog, we explore the Executive Order's PQC-related strategies, its implementation timeline, and best practices for fulfillment of requirements.
Digital Lock
Blog post

Your Data’s Future Depends on It: Why HSMs and KMS Are the Bedrock of Cybersecurity

Here’s why Utimaco’s General Purpose HSMs and Key Management solutions are the better choice – backed by insights from Gartner.
Payments
Blog post

Payment HSM Certifications Explained

This blog explores the key certifications for Payment HSMs, their importance, and how they help organizations navigate the complex world of secure digital payments.
digital cloud
Blog post

Resolutions for 2025: Why Complete Cloud Security Should Be at the Top of Your List!

Time to Set Your Strategy for Complete Cloud Protection
digital cloud
Blog post

General Purpose HSMs as a Service securing your Cloud Environment

Discover how GP HSMaaS secures cloud infrastructure, offering enhanced cybersecurity, cost-effectiveness, and flexibility over traditional setups.
a girl is holding a phone
Blog post

Understanding the Role of Hardware Security Modules in Digital Signing

The standards mandated by eIDAS work to ensure the integrity of electronic signatures. However, what is also mandated is the need for sufficiently protecting the cryptographic processes.
digital cloud
Blog post

The Importance of Data Encryption on Public Cloud Platforms - How to Secure Your Information in the Cloud

Reliance on public cloud platforms for storing, sharing and accessing data has become increasingly prevalent. This data is, however, not as private as users may assume.
somebody is clicking on the phone
Blog post

Understanding the Role of Hardware Security Modules in Public Key Infrastructure (PKI)

Public key infrastructure protects communications between users and website servers. The underlying Hardware Security Modules are the root of trust which protect PKI from being breached.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.