CRYPTOMATHIC BLOG

 

3 min read

How to Simplify Compliance Audits for Key Management Systems

This article explains some of the cryptographic key management tasks involved in demonstrating and proving compliance to acceptable standards, and...

Read More

3 min read

eIDAS & RTS for Strong Customer Authentication

The Delegated Regulation on Regulatory Technical Standards (RTS) by the European Commission aims to facilitate Strong Customer Authentication (SCA)...

Read More

3 min read

Key Management Interoperability: Achievements and Challenges

The Key Management Interoperability Protocol standard intends to provide interoperability across various key management environments and hence to...

Read More
A plain blue lego brick, representing the CEF building blocks

3 min read

CEF Building Blocks: eDelivery, eID, eSignature & More

The CEF building blocks of the digital service infrastructure, as defined under the Connecting Europe Facility (CEF), cover essential components like...

Read More
The SolarWinds attack and best practices for code-signing

2 min read

Lessons from the SolarWinds Attack: Best Practices

Since the announcement of the SolarWinds supply chain attack, intensive analysis has been done by Crowdstrike, FireEye (with additional details),...

Read More

3 min read

Symmetric Key Creation & Keyshare Generators Explained

In this article, we look at the process of a keyshare generator and key derivation as described by the ANSI X9.24-1-2017 standard. This process is...

Read More
Bring Your Own Key (BYOK) to the Google Cloud Brings New Opportunities to Financial Institutions

5 min read

BYOK for Google Cloud: Financial Institution Benefits

This article discusses the concerns surrounding key management for cloud environments and how Cryptomathic addresses them by bringing banking-grade...

Read More

2 min read

E-signatures vs Digital Signatures: Key Differences and Regulations

People often use the terms e-signature and digital signature interchangeably. However, they aren't the same thing. Everything from the processes that...

Read More
Diagram showing the different layers of mobile app security

5 min read

Solving Common Mobile Banking Security Issues

An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...

Read More