Blog

CREA plus zanimivosti s področja informacijske varnosti

Why HSM is vital to the Blockchain Technologies

We are witnessing the rapid rise of blockchain technologies in many sectors: banks, transportation, automotive, public sector, etc. Blockchain appears often as the universal panacea and the remedy to many problems.

Read more ...

How to govern cybersecurity risk at the board level

Rapidly evolving cybersecurity threats are now commanding the attention of senior business leaders and boards of directors and are no longer only the concern of IT security professionals.

Read more ...

What is FIPS 140

Federal Information Processing Standards (FIPS) are a collection of security standards publicly published by the US National Institute of Standards and Technology (NIST). The FIPS 140 regulation specifies requirements for cryptographic modules and covers both software and hardware components.

Read more ...

How to Deliver High-Trust Electronic Signing Solutions in Banking

International banks are rapidly evolving to cater to the digital world. With pen and paper signatures nearly obsolete, banks are investing in electronic signatures as a more secure, trustworthy replacement. 

Read more ...

Cyber Attackers Turn to Business Disruption as Primary Attack Objective

Over the course of 2019, 36% of the incidents that CrowdStrike investigated were most often caused by ransomware, destructive malware or denial of service attacks, revealing that business disruption was often the main attack objective of cybercriminals.

Read more ...

Ransomware Removal, Protection, and Prevention

Ransomware is malware that encrypts the data of a user. The data is rendered unusable and the victim is ordered to pay a ransom fee to decrypt the data. Ransomware has increased in sophistication in recent years.

In this article we’ll cover targets and types of ransomware attacks and some immediate steps you can take if you have been a victim of a ransomware attack. Read on to learn about ransomware protection and prevention, including pre-execution, pre-damage, and post-damage.

Read more ...

The Impact of Quantum Computing on Banking will be Gigantic

According to Deltec Bank, the Bahamas “Banks are successfully trialing quantum computers to solve problems that were previously very resource-intensive or impossible to complete.”

There has been a lot of hype around quantum computing over the last few years whereby it is poised to disrupt entire industries from telecommunications to security, manufacturing, and finance.

Read more ...

How HSMs support secure multi-tenancy?

As business grew, so did the threat of compromise or theft of data. To address these risks, both software methods and hardware devices were produced to secure networks, systems and data.

HSMs are dedicated devices, incorporated with both logical and physical protection mechanisms, designed to provide separate, secure operating environments where confidential or sensitive information could be treated without risk of exposure.

Read more ...

What is an HSM? 

Today the security needs of companies require that they have a high level of protection, particularly when it comes to data.

From payment methods such as credit cards to personal customer information and business data, organizations that handle any of this information need to ensure they’re protected.

A hardware security module (HSM) is designed to provide an exceptionally high level of security to businesses in a variety of industries that need to safeguard their data. But what is an HSM, and what are the benefits of using one?

Read more ...

Cyber Security for Board Members

As a Board member you need to understand enough about cyber security so you can have a fluent conversation with your experts. 

Good cyber security is all about managing risks. The process for improving and governing cyber security will be similar to the process you use for other organisational risks. It is a continuous, iterative process.

Read more ...
Page 2 of 3

News

Utimaco HSM MS CA Video Integration Guide

Utimaco video IG 4CREAplus has published a short video showing how easy it is to integrate an Utimaco hardware security module (HSM) with Microsoft AD CS.

Read more ...

Privilege Escalation Vulnerability

utimaco LAN V5 3Utimaco has been made aware of a vulnerability affecting the Windows installations of some of our products.

Read more ...

Utimaco on RISK Conference 2020

Utimaco presentation RISK 2020Utimaco is going to attend the RISK conference 2020 with a presentation "Trust the NEXT Digital Era".

Read more ...

CREAplus Successfully Delivered Training for Utimaco HSM

utimaco LAN V5 4CREAplus, authorized Utimaco training partner, successfully delivered another Utimaco Academy 2-day online hands-on technical training on Utimaco hardware security module (HSM), in November 2020.

Read more ...

Blog: NIST’s Standardisation of PQC

graph data breachesBlog post: The World of Quantum Computing - NIST’s Standardisation of PQCCybersecurity