Blog

CREA plus zanimivosti s področja informacijske varnosti

Cyber Security for Board Members

As a Board member you need to understand enough about cyber security so you can have a fluent conversation with your experts. 

Good cyber security is all about managing risks. The process for improving and governing cyber security will be similar to the process you use for other organisational risks. It is a continuous, iterative process.

Read more ...

Sizing Up Your Cyberrisks

Over the past decade the costs and consequences of cyberbreaches have grown alarmingly. The total financial and economic losses from the 2017 WannaCry attack, for instance, were estimated to reach $8 billion. In 2018 Marriott discovered that a breach of its Starwood subsidiary’s reservation system had potentially exposed the personal and credit-card information of 500 million guests.

 

Read more ...

What Are Botnets?

Botnets are groups of malware-infected, Internet-connected devices that perform mundane tasks with precision and speed. They are led by bot masters, aka bot herders, who communicate with a C&C server (a computer that instructs infected devices to carry out attacks and perform other functions) via covert channels, such as Internet Relay Chats (IRCs) and websites.

Each individual connected computer in a botnet is called a zombie because the computer or device owner is generally unaware that their machine is mindlessly performing malicious actions. Botnets can wreak all kinds of havoc—from DDoS attacks to cryptocoin mining, from sending spam to spreading fake news.

Read more ...

How hardware security modules could protect your crypto assets

As a security consultant for blockchain projects at Orbs, one of the recurring concerns I hear from customers is how to protect the private keys of their hot and cold wallets.

A hardware security module (HSM) is a tradition security solution which manages digital keys and is been used widely in PKI environments and in the financial sector.

At first glance, using of a HSM might be the perfect solution for blockchain-based solutions. The HSM generates key pairs, has secure storage, and can off-load cryptographic operations from the entire system.

Read more ...

The Importance of Securing the Blockchain

Blockchain is a technology that promises to change how data is stored and businesses operate. 

It is important to ensure that the blockchain, and the data that it stores, is properly protected.

Store your cryptographic material for blockchain in a Hardware Security Module (HSM).

Read more ...
Page 3 of 3

News

Borzen with Utimaco HSM

Utimaco frontSlovenian company Borzen, a power market operator, has chosen to use quality hardware security module (HSM) from Utimaco for protection and management of cryptographic keys.

Read more ...

New Release of Atalla AT1000 HSM (8.40)

u.trust 360The Utimaco Atalla Team has announced the release of the Atalla AT1000 hardware security module (HSM) version 8.40.

Read more ...

u.trust 360 - Remote Monitoring and Management of HSMs

u.trust 360With the Utimaco u.trust 360 administration platform you can remotely access your Atalla HSMs for real-time monitoring, configuration or reporting purposes on premises or in the cloud.

Read more ...

Technical Training for Utimaco HSM

utimaco LAN V5 4CREAplus, authorized Utimaco training partner, is going to deliver an online hands-on technical training for Utimaco HSM, on 4-5 February 2021.

Read more ...

CREAplus awarded ISO 27001 certification

Utimaco video IG 4CREAplus has been awarded the ISO 27001 certification (full name ISO/IEC 27001:2013).

Read more ...