CRYPTOMATHIC BLOG

 

7 min read

Top 10 Mobile App Security Threats and How to Protect Your Data

The ubiquity of mobile applications has made them part of our day-to-day lives, but with the increased use comes the risk of potential security...

Read More

7 min read

What is an Electronic Signature? How It Differs from Digital Signatures

Were I to ask you what a handwritten signature looks like, with an air of confidence will you grab a pen and scrawl your name on a piece of paper,...

Read More

4 min read

Using EUDI Wallets for Secure Digital Payments

The European Digital Identity Wallet (EUDI Wallet) is at the forefront of the European Commission's eIDAS initiative to establish a secure and...

Read More
organizations are getting ready for the quantum security era

4 min read

PQC and How Organizations Prepare for Quantum Security

Quantum computers offer potential transformational power for organizations dealing with complex computational problems in various industries such as...

Read More

4 min read

How FinTech is Helping Build a More Sustainable Financial Future

Along with the increased convenience and security offered by digital payment technology, many consumers are now showing greater interest in...

Read More

5 min read

The Evolution and Benefits of Zero-Trust Security

The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires...

Read More

4 min read

Cryptomathic's Mobile App Security Core for EUDI Wallet protection

Cryptomathic Mobile App Security Core (MASC) is a comprehensive security software solution for the European Digital Identity (EUDI) wallet, eID apps,...

Read More
EUDI Wallet for payments

1 min read

Banks Ask EU to Reconsider Payments in EUDIW Legislation

The European Digital Identity Wallet (EUDIW) has the potential to serve as a comprehensive identity gateway, enabling individuals to manage their...

Read More

3 min read

Bring Your Own Key (BYOK) in Your Company’s Data Security Strategy

The adoption of cloud computing has altered the approach organizations take toward security. Rather than concentrating on securing the perimeter of a...

Read More