How HSMs support secure multi-tenancy?

 As business grew, so did the threat of compromise or theft of data.  To address these risks, both software methods and hardware devices were produced to secure networks, systems and data.  HSMs are dedicated devices, incorporated with both logical and physical protection mechanisms, designed to provide separate, secure operating environments where confidential or sensitive information could be treated without risk of exposure.   

Read more

Making Blockchain Technology Secure and Auditable

Modern society and commerce are based on trust and digital identities. Companies and organizations build a reputation for being trustworthy. Consequently, the trust in their products is based on the trust in the organization.

Read more

eIDAS: The Advantages of QES as compared to AES

Advanced and Qualified Electronic Signatures are electronic signatures that comply with EU Regulation 910/2014 on eIDAS electronic transactions in the European internal market. They enable long-term verification of electronic signatures. Today, we explain the difference between Qualified and Advanced Electronic Signatures, both in terms of legal status and technical requirements.

Read more

Trends and observations from RSA Conference San Francisco 2019

As one of the world’s largest and highly-regarded cybersecurity conferences, the RSA Conference has steadily grown from its original form as a phone conference in 1991. Known as the RSA Data Security Conference, its first in-person event drew more than 200 attendees. Today, simply known as the RSA Conference, its events have spread over the globe in addition to their yearly San Francisco conference.

Read more

Crypto agility - How to determine your timeline for post-quantum preparation

There is a significant uncertainty when it comes to the impact of quantum computing on modern cryptography. Perhaps the largest concern centers on just exactly when the quantum cryptography apocalypse will occur. While there are flurries of activity surrounding both the development of stable quantum computers and the cryptography algorithms that can withstand them, many are operating on what is at best a "loose" timeline. To help you on your journey to crypto-agility, let's take a look into how to determine your timeline for post-quantum preparation.

Read more

How Samsung prepares devices sold today for a life in the post-quantum era

In this video blog, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center, describes his company’s strategy to develop products today which are prepared for the post quantum era.

Read more

Crypto-agile HSMs by Utimaco used in research for post-quantum cryptography

With every passing day, the need for crypto agility becomes more important. Whether you believe quantum computing is 10 years, 20 years or more away, the inevitability is that it is approaching fast. This is why many leading technology organizations have begun to research the impact of new quantum-safe algorithms on their existing products or infrastructure. This research is facilitated by the use of , Hardware Security Modules (HSMs). It is within the secure parameter of an HSM that existing and quantum-safe algorithms should be executed - but not many HSMs are capable of doing this. This why the flexibility and functionality of HSMs play an important role in in crypto agility.

Read more

Michele Mosca: Quantum computing will decimate the security infrastructure of the digital economy (video)

Quantum computing will decimate the security infrastructure of the digital economy. Quantum computing in general is certainly a blessing to humanity in many respects and it promises to disrupt evolution of technology in more than one dimensions. But it is also a curse to security, as cryptographic algorithms that proved to be secure for decade may be breached by quantum computers within minutes.

Read more

eIDAS & strong customer authentication under PSD2

Since the beginning of 2018, PSD2 or the 2nd Payment Services Directive is national law in all EU member states. Some countries have implemented the new directive early on, such as Germany and the UK, but for some it is still work in progress today.

Read more

Ready to take off?

Download our HSM simulator!

Register for free