CREA plus zanimivosti s področja informacijske varnosti

Data Security and Encryption

The number of data breaches and security threats has been steadily increasing for years.

Read more ...

Coexistence of Blockchain and HSM

Blockchain is a system of recording information that makes it impossible to change, cheat or hack the system.

Read more ...

What Are the Threats of Quantum Computing?

In the previous blogs we have briefly touched upon how resistant symmetric and asymmetric cryptography are against quantum attacks. Here we discuss the topic in more depth.

Read more ...

Utimaco Atalla AT1000 Payment HSM

Utimaco successfully completed its acquisition of the Atalla payment Hardware Security Module (HSM) and Enterprise Secure Key Manager (ESKM) product lines from Micro Focus in November 2018. This strategic acquisition has positioned Utimaco as the second-largest hardware security module (HSM) manufacturer in the world and has createed the most comprehensive HSM offering on the market.

Read more ...

What is Asymmetric Cryptography and How Does It Work?

We can roughly divide encryption algorithms into symmetric and asymmetric ones. Symmetric ones have a longer history. It can be said that they have over 2000 years of history and development. The concept of asymmetric or public-key cryptography, on the other hand, was developed in 1970s and first publicly published in 1977 by Whitfield Diffie and Martin Hellman, researchers at Stanford University.

Read more ...

What is Symmetric Cryptography and How Does It Work?

When talking about symmetric cryptography we have in mind cryptographic algorithms enabling communication between a sender and a receiver. Both of them use the same cryptographic key for encryption and decryption.

Read more ...

How Does Strong Customer Authentication Help Banks Fight Against Fraud?

Today, consumers rely on mobile and online transactions to manage their bank accounts, sign up for mortgages and pay bills. This convenience has a dark side: fraud and phishing are on the rise. But things are about to change, driven by regulatory compliance.

Read more ...

Why HSM is vital to the Blockchain Technologies

We are witnessing the rapid rise of blockchain technologies in many sectors: banks, transportation, automotive, public sector, etc. Blockchain appears often as the universal panacea and the remedy to many problems.

Read more ...

How to govern cybersecurity risk at the board level

Rapidly evolving cybersecurity threats are now commanding the attention of senior business leaders and boards of directors and are no longer only the concern of IT security professionals.

Read more ...
Page 1 of 3


Webinar on Post-Quantum Cryptography (PQC)

the risk 03Cryptographic algorithms that proved to be secure for decades may be breached by quantum computers within minutes. 

Read more ...

Cynet Chooses CREAplus as a New Distributor for Cynet 360

Cynet SecurityCynet Security and CREAplus join forces to bring Cynet 360, the industry's first autonomous breach protection platform, to the Southeastern European market.

Read more ...

Technical Trainings for Cryptographic Solutions

Training Ljubljana 20190725 110441sml2CREAplus, authorized Utimaco training partner, has expanded its range of technical trainings for additional Utimaco cryptographic solutions.

Read more ...