CRYPTOMATHIC BLOG

 

4 min read

Mobile Security: The Weaknesses of Secure Elements and Enclaves

Secure elements (SE) on Android and secure enclaves on iOS have emerged as trusted hardware-backed solutions for storing and protecting sensitive...

Read More

3 min read

Cryptomathic Innovates in mobile security by extending its MASC solution with an Insights Service -Reaction Engine

Cryptomathic is thrilled to announce a significant enhancement to our Mobile App Security Solution (MASC) offering with Insights Service. Insights...

Read More

4 min read

Choice of app protection approach affects how well protected an app is

The choice of app protection should not be taken lightly. Modern applications face numerous threats that evolve alongside advancements in...

Read More

1 min read

Unveiling Obsidian: Next-Gen Payment Platform for the Cloud Era

We are delighted to announce the launch of Obsidian payment platform, a cutting-edge digital payments solution for issuers designed to meet the...

Read More

7 min read

Quantum-Resistant Certificates: Why They Matter

Short-lived certificates play a vital role in current infrastructures, finding a suitable quantum-resistant alternative to the currently used...

Read More

2 min read

Cryptomathic & PQShield: Partnering for PQC Solutions in Code Signing

Two foremost software security experts and pioneers in cryptographic agility and post-quantum cryptography join forces to offer comprehensive,...

Read More

4 min read

The EUDI Wallet Certification Process: Key Challenges

As the European Union solidifies the framework for the EUDI (European Digital Identity) wallet, the certification process outlined in the...

Read More

6 min read

Qualified Electronic Signatures: Best Practice Implementation of SAM

This article evaluates the implementation options for the Signature Activation Module (SAM) in the context of eIDAS 2. Based on this analysis we...

Read More

2 min read

Hard Truths About Hardware: EUDI Wallet Needs More Than Secure Chips

Mobile phones are increasingly vulnerable to hacking and fraud, presenting significant challenges for securing sensitive applications like the EUDI...

Read More