Blog

CREA plus zanimivosti s področja informacijske varnosti

Digital Signature

Today’s world is a digital world. A place of online meetings, virtual conferences, cloud-stored documents, and… digital signatures.

Read more ...

NIST’s Standardisation of PQC

In one of the previous blogs and on a recent PQC webinar we have discussed the public-key cryptography’s vulnerability to quantum attacks, specifically to attacks relying on Shor’s algorithm.

Read more ...

Zerologon Vulnerability

In September 2020 Secura published an article disclosing a vulnerability in Windows Server (all known versions) Netlogon Remote Protocol. This vulnerability is known as CVE-2020-1472 or more commonly, Zerologon.

Read more ...

Data Security and Encryption

The number of data breaches and security threats has been steadily increasing for years.

Read more ...

Coexistence of Blockchain and HSM

Blockchain is a system of recording information that makes it impossible to change, cheat or hack the system.

Read more ...

What Are the Threats of Quantum Computing?

In the previous blogs we have briefly touched upon how resistant symmetric and asymmetric cryptography are against quantum attacks. Here we discuss the topic in more depth.

Read more ...

Utimaco Atalla AT1000 Payment HSM

Utimaco successfully completed its acquisition of the Atalla payment Hardware Security Module (HSM) and Enterprise Secure Key Manager (ESKM) product lines from Micro Focus in November 2018. This strategic acquisition has positioned Utimaco as the second-largest hardware security module (HSM) manufacturer in the world and has createed the most comprehensive HSM offering on the market.

Read more ...

What is Asymmetric Cryptography and How Does It Work?

We can roughly divide encryption algorithms into symmetric and asymmetric ones. Symmetric ones have a longer history. It can be said that they have over 2000 years of history and development. The concept of asymmetric or public-key cryptography, on the other hand, was developed in 1970s and first publicly published in 1977 by Whitfield Diffie and Martin Hellman, researchers at Stanford University.

Read more ...

What is Symmetric Cryptography and How Does It Work?

When talking about symmetric cryptography we have in mind cryptographic algorithms enabling communication between a sender and a receiver. Both of them use the same cryptographic key for encryption and decryption.

Read more ...
Page 1 of 3

News

Technical Training for Hardware Security Module (HSM)

utimaco LAN V5 4CREAplus, authorized Utimaco training partner, is going to deliver an online hands-on technical training for hardware security module (HSM), on 3-4 June 2021.

Read more ...

CREAplus Successfully Delivered Training for Utimaco HSM

utimaco LAN V5 4CREAplus, authorized Utimaco training partner, successfully delivered another 2-day online hands-on technical training on hardware security module (HSM), in April 2021.

Read more ...

CREAplus at Locked Shields 2021 with Cynet 360

cynetThe largest international live cyber defense exercise Locked Shields 2021, in which CREAplus experts also participated with the Cynet 360 platform, has successfully come to an end. 

Read more ...

Cyber Security Exercise Locked Shields 2021

u.trust 360CREAplus is a part of the world's largest cyber defense exercise - more than 2000 experts from 30 nations are taking part in the Locked Shields 2021, the largest and most complex international Live-Fire Cyber Exercise organized by NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). 

Read more ...

u.trust 360 Now With Support for CryptoServer LAN HSMs

u.trust 360With the Utimaco u.trust 360 administration platform you can now remotely access your Atalla AT1000 and CryptoServer LAN V5 hardware security modules (HSMs) for real-time monitoring, configuration or reporting purposes on premises or in the cloud.

Read more ...