Cybersecurity for connected vehicles

Cybersecurity for connected vehicles

Vehicles today come with an array of convenience and safety features driven by software. This means that the cybersecurity of these vehicles must now also be taken seriously. The threat of cyber-attacks has been a growing concern in connected vehicle technology, but there are measures that can be taken to protect a vehicle from malicious actors.

EMV Personalization cryptographic requirements 

EMV Personalization cryptographic requirements 

EMV Personalization is a process used to get card data into cards, mobile phones, and wearables. The process includes a variety of complicated cryptographic tasks and activities, ranging from choosing proper cryptographic algorithms to authentication procedures. Ensuring all these steps are carried out accurately and securely is highly critical for card issuing and payments.

How Cryptomathic’s AWS BYOK Service Provides Secure Scalability, Durability, and Availability

How Cryptomathic’s AWS BYOK Service Provides Secure Scalability, Durability, and Availability

In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must do it securely.

Cryptomathic’s AWS BYOK Service for Enhanced Auditability in The Cloud

Cryptomathic’s AWS BYOK Service for Enhanced Auditability in The Cloud

Many industries, including banking, finance and healthcare are required to comply with data security standards under regulations like SOC, NIST, PCI, GDPR or HIPAA. Such industries can be subject to costly penalties if they are unable to prove their compliance in the event of a security breach.

Secure BYOK for AWS Simple Storage Services (S3)

Secure BYOK for AWS Simple Storage Services (S3)

Cloud storage via AWS Storage Services is a simple, reliable, and scalable way to store, retrieve and share data. As a third-party cloud vendor, AWS manages and operates the data storage as a service. Because the data is delivered on demand using JIT capacity and costs, it eliminates having to buy and manage your own infrastructure for storing data. This service supplies anytime, anywhere data access which gives agility, durability, and global scalability for users. To maintain compliance with major industry standards like GDPR, HIPAA, PCI-DSS while harnessing the advantages of cloud storage, this article suggests a bring your own key solution with automated audit features.

Accenture's Insights on Crypto-Agility

Accenture's Insights on Crypto-Agility

This article discusses Accenture’s insights on crypto-agility that were derived from its recent research report on preparing for post-quantum decryption.

How Prepared are Companies for Quantum Computing Cybersecurity Risk?

How Prepared are Companies for Quantum Computing Cybersecurity Risk?

This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current threats are.

New Executive Order on U.S. Surveillance Might Lead to "Schrems III"

New Executive Order on U.S. Surveillance Might Lead to "Schrems III"

In this article we will discuss why shortfalls in U.S. President Joe Biden’s recent Executive Order do not meet the requirements of the EU’s Charter of Fundamental Rights.

How Cryptomathic’s AWS BYOK Service Provides Expanded Security

How Cryptomathic’s AWS BYOK Service Provides Expanded Security

This article discusses how Cryptomathic’s AWS BYOK Service delivers expanded security to protect cryptographic keys while using AWS cloud applications.