Why blockchains need to be auditable for business adoption

Blockchain has become one of the biggest technological surges of this century. It has been, and still is, primarily used by individuals for unregulated financial transactions. However, if blockchain is going to live on and have a lasting impact, it will need to be adopted by businesses.

In this article we’ll be discussing why blockchains need to become auditable, and how this functionality will promote a wider development of this emerging technology.

Read more

Introduction into public key infrastructure and hardware security modules

A public key infrastructure (PKI) is the framework needed to manage public-key encryption. PKI protects communications between companies and users to exchange information and money safely and securely.

A PKI consists of:

Read more

What is crypto-agility and how to achieve it?

Crypto-agility can be elaborated as the ability and aptitude of a system to promptly shift from the existing cryptographic algorithms and primitives to the newer and updated ones. With the advent of quantum computing, it has been obvious that the RSA based public-key systems which stand on large integer factorization and discrete logarithm problems would be breakable.

Read more

How eIDAS is related to PSD2 & AML4 and relevant for banking & financial services

In the context of a Digital Single Market in Europe, the need for secure electronic transactions across member states is a big topic for banking and financial services players. Electronic ID and trust services are key compliance factors for identification and authentication after recent regulatory updates such as PSD2 or AMLD4.

Read more

Securing the financial cloud

Together with a consortium of four companies and a university, Utimaco has been researching since  March 1, 2014. The aim of the project is to design and develop financial cloud architecture for transferring highly sensitive financial transactions via cloud services.

Read more

Root of trust in the Internet of things: interview at cloud computing expo

Interview regarding the role of HSMs as a root of trust in the Internet of Things at a Cloud Computing Expo in Santa Clara, CA

Read more

How to select an HSM

As the choice of Hardware Security Module is dependent on the specific application it is used for, I would like to make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.

Read more

Making security a priority in connected cars

The growing number of Internet-connected devices and accessories in the connected car opens it up to new potential points of attack for cybercriminals.

Read more

eIDAS regulation: do not make the wrong choice when you are picking your HSM

In this blog post, I want to limit myself to the essential basis of eIDAS, the HSM (Hardware Security Module). If you want more information about eIDAS, please visit the websites mentioned at the end of this article.

Read more

Ready to take off?

Download our HSM simulator!

Register for free