CRYPTOMATHIC BLOG

 

4 min read

The Challenges of Certifying the EUDI Wallet: A Deep Dive

As the European Union solidifies the framework for the EUDI (European Digital Identity) wallet, the certification process outlined in the...

Read More

6 min read

Qualified Electronic Signatures – Best Practice Implementation of the Signature Activation Module (SAM)

This article evaluates the implementation options for the Signature Activation Module (SAM) in the context of eIDAS 2. Based on this analysis we...

Read More

2 min read

Hard Truths About Hardware: Why the EUDI Wallet Needs More Than Just Secure Chips

Mobile phones are increasingly vulnerable to hacking and fraud, presenting significant challenges for securing sensitive applications like the EUDI...

Read More

2 min read

Assessing the EUDI Wallet Reference Implementation Code

The EUDI wallet reference implementation serves as a practical guide for developers to create secure digital identity management solutions based on...

Read More

3 min read

Key Vulnerabilities of the EUDI Wallet Solution Reference Architecture (ARF)

The EUDI (European Digital Identity) wallet solution reference architecture (ARF) is designed to provide a secure framework for managing digital...

Read More

2 min read

Cryptomathic Signer and KeyCloak Integration: A Powerhouse for eIDAS-Compliant Remote Signing

To deliver trust services, managing user´s identities and access is paramount. eID schemes and trust service providers all require IdP solutions for...

Read More

3 min read

7 essential strategies to secure mobile-first consumer-driven banking

North America is catching up fast to the open banking initiatives that are currently thriving across Europe, South America and Asia Pacific. As...

Read More

1 min read

Cryptomathic names new Sales Director for South Europe, Africa & LatAm

Cryptomathic is delighted to welcome Edmundo Diaz as its new Sales Director for Southern Europe, Africa and Latin America (LatAm). Edmundo’s...

Read More
Secure Your Data in Azure with External Key Management and BYOK

1 min read

Secure Your Data in Azure with External Key Management and BYOK

Data security can be complex, but it's essential in today's business world, especially when using cloud services. One effective approach is adopting...

Read More