CRYPTOMATHIC BLOG

 

1 min read

Cryptomathic launches Signer 6

signer 6 enables future-proofed, scalable digital signing to support the upcoming european digital identity wallet (eudi) We are delighted to...

Read More

2 min read

NIS2 succeeds NISD, and can now affect you too

Cryptomathic guides you towards compliance. EU Directive 2022/2555 on Network and Information Systems, also known as NIS2, entered into force on Jan...

Read More

1 min read

Secure-by-design key management for risk remediation against Storm-0558 type attacks

Over the course of a month in May/June 2023, hundreds of thousands of emails belonging to Microsoft customers were exposed to a hacker labelled...

Read More

4 min read

Steps to Achieve State-of-the-Art Protection for Your Mobile Apps

In today's digital landscape, ensuring the security of your mobile applications is paramount. Cryptomathic's Mobile App Security Core (MASC) is at...

Read More

2 min read

(re)Introducing Cryptomathic

A note from Laurent Lafargue, Global CEO If you’re reading this, you may have noticed a new look to the Cryptomathic website today! We’re very...

Read More

2 min read

Mobile Point of Sale Compliance – What is it all about?

PCI have recently released the new standard and compliance program for Mobile Payments on Commercial off-the-shelf devices (MPoC). This blog is the...

Read More

2 min read

eIDAS 2.0 – What’s New?

The European eIDAS regulation, short for the Electronic IDentification, Authentication and Trust Services Regulation, was created in 2014 to ensure...

Read More

2 min read

Demystifying Mobile Application Hardening: Techniques and Best Practices

What is Mobile Application Hardening? Mobile application hardening refers to the process of securing mobile applications against various threats and...

Read More

2 min read

More Post-Quantum Digital Signature Candidates!

On July 17, 2023, the National Institute of Standards and Technology (NIST) announced a new set of 40 candidates to compete in their Post-Quantum...

Read More
High rise buildings- banking

3 min read

Cloud Data Security: Why Centralized Key Management is Vital for Banks

In today's digital era, banks are increasingly leveraging cloud and multi-cloud environments to drive operational efficiency. However, the security...

Read More

2 min read

The European Digital Identity Wallet as a Means of Authentication

The European Commission, as part of the eIDAS 2.0 proposal promotes the European Digital Identity Wallet (EUDI Wallet) as an app that enables...

Read More

3 min read

AWS External Key Store (XKS) with the Crypto Service Gateway

AWS Key Management Service (KMS) has long provided cryptographic services to safeguard your AWS resources. This involves generating and managing keys...

Read More

3 min read

Cybersecurity Paradox: How Too Many Solutions Makes You Less Secure

Believing that more cybersecurity solutions increase safety is a common misconception. An overload of security measures can ironically generate more...

Read More

4 min read

Improving Cloud Key Management with the Enclave Security Module

When organizations make the strategic decision to shift their applications and infrastructure onto the cloud, they face a myriad of challenges. These...

Read More
lots of digital pad locks

7 min read

Top 10 Mobile App Security Threats and How to Protect Your Data

The ubiquity of mobile applications has made them part of our day-to-day lives, but with the increased use comes the risk of potential security...

Read More

2 min read

Securing a Software-Defined Future in the Automotive Sector

For decades, cars have been equipped with multiple connected electronic control units (ECUs) that manage various functions like entertainment, route...

Read More

7 min read

WHAT IS AN ELECTRONIC SIGNATURE? HOW DOES IT DIFFER FROM DIGITAL SIGNATURES?

Were I to ask you what a handwritten signature looks like, with an air of confidence will you grab a pen and scrawl your name on a piece of paper,...

Read More

4 min read

Payments from a European Digital Identity (EUDI) Wallet

The European Digital Identity Wallet (EUDI Wallet) is at the forefront of the European Commission's eIDAS initiative to establish a secure and...

Read More
organizations are getting ready for the quantum security era

4 min read

PQC and How Organizations are Preparing for the Quantum Security Era

Quantum computers offer potential transformational power for organizations dealing with complex computational problems in various industries such as...

Read More
FinTech is Helping Build a More Sustainable Financial Future

4 min read

How FinTech is Helping Build a More Sustainable Financial Future

Along with the increased convenience and security offered by digital payment technology, many consumers are now showing greater interest in...

Read More

5 min read

The evolution of zero-trust security

The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires...

Read More

4 min read

How Cryptomathic's Mobile App Security Core Protects the EUDI Wallet

Cryptomathic Mobile App Security Core (MASC) is a comprehensive security software solution for the European Digital Identity (EUDI) wallet, eID apps,...

Read More
NIST Seeks Public Feedback to Draft Guide on Migration to Post-Quantum Cryptography

2 min read

NIST Seeks Public Feedback to Draft Guide on Migration to PQC

The National Cybersecurity Center of Excellence (NCCoE) has released a preliminary guide on practices for migrating from legacy cryptography to...

Read More
EUDI Wallet for payments

1 min read

Banks Ask EU to Reconsider Inclusion of Payments in EUDIW Legislation

The European Digital Identity Wallet (EUDIW) has the potential to serve as a comprehensive identity gateway, enabling individuals to manage their...

Read More
Cloud key management

3 min read

Bring Your Own Key (BYOK) as Part of Your Company's Data Security Strategy

The adoption of cloud computing has altered the approach organizations take toward security. Rather than concentrating on securing the perimeter of a...

Read More

4 min read

Selecting a Mobile App Security Solution for the EUDI Wallet

Organizations responsible for the development of an EUDI wallet (or other apps with highly sensitive data), will be acutely aware of the importance...

Read More

3 min read

Open Banking: is 2023 the year it becomes mainstream?

Following its introduction in January 2018, the Open Banking regulation mandates UK banks to provide their data in a standardized format,...

Read More

4 min read

Why is Zero Trust Important?

Zero Trust security is a concept that has been discussed extensively. However, there are many different interpretations of what it means. Some...

Read More
Cryptomathic and Fidentity

2 min read

New Partnership : Cryptomathic and Fidentity

Cryptomathic is excited to announce that we have partnered with fidentity, an expert in online identity verification, to enable automated identity...

Read More

6 min read

Resources to Help You Develop and Test EUDI Wallet App Security

Itemizing the potential risks of the European Digital Identity (EUDl) Wallet scheme is a complex task that involves assessing the attack surface of...

Read More

3 min read

Cloud Adoption Opportunities & Challenges in the Financial Sector

The recent U.S. Department of the Treasury report highlights potential benefits and challenges associated with a growing trend amongst financial...

Read More

3 min read

Threats to the EUDI Wallet App

The European Digital Identity wallet (EUDI wallet) is proposed by the European Commission to provide a secure, safe and standardized digital identity...

Read More

5 min read

How to Safeguard Your EUDI Wallet: Tips and Strategies for App Security

Following a Recommendation by the European Commission, from the end of 2023 each EU Member State will gradually offer the European Digital Identity...

Read More

3 min read

Examining the Increasingly Important Role of AI in Cybersecurity

Artificial intelligence is becoming more involved in cybersecurity, with both positive and negative implications. Companies can utilize AI tools to...

Read More

5 min read

Payment Fraud and Mitigation Trends in 2023

Merchants must remain vigilant against fraud and ensure they have the necessary tools to combat it. Failure to do so may render their fraud detection...

Read More

4 min read

Will Cyberattacks Cause the Next Financial Crisis?

The recent instability of a major bank that catered to US tech startups caused concern for several prominent tech companies and venture capitalists,...

Read More

5 min read

Encryption for GDPR Compliance

Under the GDPR, organizations must take appropriate measures to protect personal data from unauthorized access, use, disclosure, or destruction. One...

Read More

6 min read

Outline of the Players in the EUDI Wallet Ecosystem

The European Digital Identity (EUDI) Wallet aims to offer digital wallets to all EU citizens and businesses for identification purposes and document...

Read More

5 min read

What is an Assurance Protocol in Mobile App Security?

Mobile apps and mobile software components are rarely stand-alone as they frequently perform their most important operations on various backend...

Read More
How to Protect Yourself Against “Steal Now, Decrypt Later”?

4 min read

PQC & Crypto-agility: Protect Against Steal Now, Decrypt Later

Large-scale quantum computing is coming soon, and with that comes new cybersecurity threats. One of these threats is "steal now, decrypt later,"...

Read More
How Should Companies Get Prepared for Quantum Computing Related Threats?

3 min read

How Should Companies Get Prepared for Quantum Computing Related Threats?

It is not a question of if, but when quantum computing will arrive and be used for malicious purposes, as the expectation is that this new technology...

Read More

2 min read

HSM remote key loading using CKMS and PCI-certified KLD

Hardware security modules (HSMs) are physical devices that provide cryptographic functions such as encryption/decryption and digital signing. They...

Read More

5 min read

Cybersecurity Trends To Watch Out For In 2023 And Beyond

Each year, various events within the cybersecurity industry have a significant impact on the industry, leading experts to predict an increase in the...

Read More
PQC and crypto agility

2 min read

Preparing For Post-Quantum Cryptography In 10 Steps

With post-quantum technology having the potential to trigger a new wave of cyber threats, we identify 10 steps that organizations should take to...

Read More

4 min read

Will The UK Follow The EU On Digital Identities?

The UK's relationship with the EU has been tumultuous in recent years, especially in the wake of Brexit. With regards to digital identities, former...

Read More

2 min read

Get More Control Of Your Data In The Cloud With Cryptomathic's BYOK Service

Cloud computing brings many benefits to enterprise businesses; easily scalable, cost-effective and resilient, cloud computing enables rapid...

Read More

4 min read

Exploring The EMV Personalization Process

EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card...

Read More

5 min read

Protecting the European Digital Identity Wallet

The European Commission promotes the European Digital Identity wallet (EUDI wallet) as part of its effort to digitize the economy and help foster...

Read More
How Bring Your Own Key Can Provide Schrems II Compliance for AWS-Hosted Data

4 min read

How BYOK Provides Schrems II Compliance for AWS-hosted Data

Companies who use Amazon Web Services (AWS) often choose to do so because of its scalability, ease of use and lower costs than other services or...

Read More

3 min read

Why 2023 is the year to become PQC-ready

2022 was a big year in the cryptographic security community. If you don’t have news alerts set up for the latest updates on Post-Quantum Cryptography...

Read More

4 min read

What Does Quantum Computing Mean For Data Protection?

The threat of quantum computers is real and it could mean the end of encryption as we know it. Quantum computers are capable of performing...

Read More

2 min read

NIST Picks Lightweight Cryptography Algorithms to Secure Small Devices

Security experts from the National Institute of Standards and Technology (NIST) have declared Ascon - a group of cryptographic algorithms - as the...

Read More

3 min read

Secure BYOK Service for AWS S3 Buckets

Keeping data safe in the Cloud has always been a concern for users, hence the need for encrypting data. With more businesses taking advantage of what...

Read More
Cardholder, Merchant, Issuer & Acquirer - The Four Corners Model for Payment Security and Key Management

4 min read

The Four Corners Model for Card Payment Security and Key Management

The “Four Corners” model, also called the “Four Party Scheme”, is utilized in almost all standard card payment systems across the globe. Here, we...

Read More

3 min read

Get Quantum-Ready with Crypto Service Gateway

When it comes to preparing for post-quantum computing, the legacy mechanisms for effective implementation, integration, and management of...

Read More

4 min read

Exploring Digital Signing Services: What's Involved in Setting Them Up?

Digital transformation has been a critical focus for businesses and institutions prior to the pandemic. Digital documents and e-signatures are a...

Read More
How Cryptomathic’s AWS BYOK Service Provides Industry Grade Compliance

3 min read

How Cryptomathic’s AWS BYOK Service Provides Industry Grade Compliance

The AWS cloud is enjoying increasing popularity with its very high levels of scalability, durability, and availability. It releases companies from...

Read More

8 min read

Cybersecurity for connected vehicles

Vehicles today come with an array of convenience and safety features driven by software. This means that the cybersecurity of these vehicles must now...

Read More
EMV Personalization cryptographic requirements 

3 min read

EMV Personalization cryptographic requirements 

EMV Personalization is a process used to get card data into cards, mobile phones, and wearables. The process includes a variety of complicated...

Read More
How Cryptomathic’s AWS BYOK Service Provides Secure Scalability, Durability, and Availability

3 min read

Cryptomathic AWS BYOK: Secure Scalability, Durability & Availability

In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must...

Read More
Cryptomathic’s AWS BYOK Service for Enhanced Auditability in The Cloud

2 min read

Cryptomathic’s AWS BYOK Service for Enhanced Auditability in The Cloud

Many industries, including banking, finance and healthcare are required to comply with data security standards under regulations like SOC, NIST, PCI,...

Read More
Secure BYOK for AWS Simple Storage Services (S3)

3 min read

Secure BYOK for AWS Simple Storage Services (S3)

Cloud storage via AWS Storage Services is a simple, reliable, and scalable way to store, retrieve and share data. As a third-party cloud vendor, AWS...

Read More
Accenture's Insights on Crypto-Agility

3 min read

Accenture's Insights on Crypto-Agility

This article discusses Accenture’s insights on crypto-agility that were derived from its recent research report on preparing for post-quantum...

Read More
BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

3 min read

Why BYOK is Essential for Data Security and Privacy in the Cloud

The 2020 Oracle and KPMG Cloud Threat Report focuses on the key risks and challenges organizations face as they implement and maintain cloud...

Read More
How Prepared are Companies for Quantum Computing Cybersecurity Risk?

3 min read

How Prepared are Companies for Quantum Computing Cybersecurity Risk?

This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current...

Read More
Protecting-banking-apps-against-malware-cryptomatic

5 min read

Protecting Banking Apps Against Malware Threats

Here we explain why additional security mechanisms, beyond the mobile OS security features, are needed to protect mobile banking applications from...

Read More
New Executive Order on U.S. Surveillance Might Lead to

3 min read

New Executive Order on U.S. Surveillance Might Lead to "Schrems III"

In this article we will discuss why shortfalls in U.S. President Joe Biden’s recent Executive Order do not meet the requirements of the EU’s Charter...

Read More
How Cryptomathic’s BYOK-as-a-Service for AWS Provides Expanded Security

2 min read

How Cryptomathic’s AWS BYOK Service Provides Expanded Security

This article discusses how Cryptomathic’s AWS BYOK Service delivers expanded security to protect cryptographic keys while using AWS cloud...

Read More

5 min read

Customer Behaviour Drives Banking Security And Cryptography Architecture

Changing customer behaviour and expectations are driving the transformation of the new banking security architecture. While customers want more...

Read More
overview-technologies-protect-banking-cryptomathic

3 min read

Overview of Defense Mechanisms for Mobile Banking Apps

As the use of mobile phones for mobile banking and payment applications increases, corresponding security threats are increasing as well. The...

Read More
Secure AWS BYOK Service for DynamoDB

2 min read

Secure AWS BYOK Service for DynamoDB

In this article we will explain what AWS DynamoDB does and how Cryptomathic's AWS BYOK Service is an option for providing secure key management as a...

Read More
TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

4 min read

TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated. The TR-34 norm is an implementation of the...

Read More
Hosting on AWS as a European Company - What about Data Residency, Regionality, Digital Sovereignty and GDPR Compliance?

3 min read

EU AWS Hosting: Data Residency, Regionality, Digital Sovereignty, GDPR

This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.

Read More

3 min read

Secure BYOK Service for AWS Applications

This article discusses using Cryptomathic’s BYOK and key management service for securely managing cryptographic keys used in AWS applications.

Read More
eSigning High-Value Documents - Prioritizing Security In The Digital Era

3 min read

eSigning High-Value Documents - Prioritizing Security In The Digital Era

As certain industries are moving ahead with digital transformation projects, online signing processes are a step forward in optimizing business...

Read More
Explaining the Java ECDSA Critical Vulnerability

3 min read

Explaining the Java ECDSA Critical Vulnerability

On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.

Read More
PCI PIN Requirements for Key Blocks in the Payment Card Industry - FAQs

3 min read

Key blocks and PCI PIN requirements: FAQs

This article proposes a few answers to a series of frequently asked questions (FAQs) about key blocks and their use with PCI.

Read More
Racks of servers supporting a secure signature creation device

3 min read

What is a Secure Signature Creation Device? Types and Requirements

As defined by Regulation (EU) No 910/2014 (eIDAS), which took effect on 1 July 2016, an electronic signature creation device is software or hardware...

Read More
Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

5 min read

Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.

Read More
eIDAS-Trust-service-uptake

3 min read

A Three-pronged Approach to Increasing eIDAS Trust Services Uptake

The last few years have been exciting for all stakeholders involved in the implementation and use of the eIDAS toolbox. Some important milestones...

Read More
Cryptomathic joins the Cloud Signature Consortium

2 min read

Cryptomathic joins the Cloud Signature Consortium as Executive Member

As a leader in qualified remote signing, Cryptomathic is pleased to announce that it has joined the Cloud Signature Consortium (CSC), a global group...

Read More

4 min read

IBM CCA: Hybrid Cloud & Key Management for Financial Service Platforms

In response to changing and more dynamic market demands, banks and financial institutions are turning into financial service platforms. They increase...

Read More
EMV Payment Security - Acquirers

4 min read

EMV Payment Security - Acquirers

In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating...

Read More

2 min read

How to implement efficient Key Management in a Legacy Infrastructure

This article discusses the various issues around key management and presents Cryptomathic’s approach to central key and crypto management that has...

Read More
Digital Signatures vs Wet Signing: The Implications Of Alleged Forged Signatures During The Home Buying Process

3 min read

Digital vs Wet Signatures: The Impact of Forgery On House Buying

Mortgage fraud is a serious crime. Once executed and signed, a mortgage deed is a legally binding contract. The responsibility of trying to prove...

Read More
Agile Cryptography for Turnaround Business Models of Retail Banks

5 min read

Agile Cryptography for Turnaround Business Models of Retail Banks

Going forward, it is imperative for existing banks to develop a strategy for sustaining their current operations and expanding in a digitized,...

Read More

3 min read

Schrems II Slows AWS Adoption for Danish Education & Pension Services

For over two years, the Schrems II decision from the European Court of Justice has caused tremors in IT departments across EU countries, such as...

Read More

5 min read

Beyond the Video-Ident Hack: Securely Sign with a Smile

For trustworthy remote identity verification, a proof of the authenticity of the identity card and of the integrity of its contents is needed, along...

Read More
What Do Companies Perceive as the Most Important Encryption Features?

5 min read

What Do Companies Perceive as the Most Important Encryption Features?

The need for certain encryption technology features can vary from company to company, depending on their individual needs for securing their data.

Read More

3 min read

EMV: The Fraud Bulldozer

These days everyone has a stake in Chip and PIN security - it can be the topic of the over-the-counter conversation as you pay, of the boardroom...

Read More
e-government-more-secure-with-central-signing-and-authentication.jpg

5 min read

Centralized Authentication and Signing for E-Government

Achieve Non-Repudiation of Origin (NRO) and Non-Repudiation of Emission (NRE)

Read More
In rethinking their strategies, traditional banks have eight digital business model options to consider that can assist them in staying relevant and remaining competitive against untraditional newcomers to the industry.

4 min read

Key Management: New Digital and Security Models for Banks

In rethinking their strategies, traditional banks have eight digital business model options to consider in order to remain competitive against...

Read More
eIDAS-building-trust-in-international-trade-Cryptomathic

3 min read

International Trade – Building Trust with eIDAS (Part 1 of 2)

International trade is based on the concept of trust. In situations where there isn’t some established trust, the trading parties get their...

Read More
Crypto-Risks-related-to-PCI-DSS-Cryptomathic

4 min read

How to Reduce Cryptography-Risks related to PCI DSS

The payment card industry data security standard (PCI DSS) calls for all financial institutions and merchants to protect their client's sensitive...

Read More
EMV Payment Security - Merchants

3 min read

EMV Payment Security - Merchants

Merchants are one of the corners of the ‘four corner’ model in the payment world. In what follows, we will explain some of the security mechanisms...

Read More
Classification-cryptpgrapjic-keys

5 min read

Classification of Cryptographic Keys

This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...

Read More
Achieving Agile Cryptography Management with Crypto Service Gateway

3 min read

Achieving Agile Cryptography Management with Crypto Service Gateway (CSG)

Cryptomathic's Crypto Service Gateway (CSG) helps you realize business-agile and efficient crypto services, with central control of security policy...

Read More
EMV Payment Security - Issuers

3 min read

EMV Payment Security - Issuers

An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...

Read More
A Brief Overview of the Challenges Involved in Key Management for EMV Personalization : The Main Actors of EMV Personalization

3 min read

Key Management Challenges for EMV Personalization

The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in...

Read More
Secure Connectivity for Mobile Banking and Payment Apps: Strong Authentication

4 min read

Why Mobile Banking and Payment Apps Need Strong Authentication

Here we provide a short overview of why strong authentication is seriously needed to provide security for mobile banking and payment applications.

Read More
smes-and-eIDAS

3 min read

How eIDAS can help SMEs grow and prosper

Small and Medium Enterprises (SMEs) form the backbone of any economy. In the European Union (EU), SMEs represent 99% of all businesses and account...

Read More
An Overview of the Different Key Block Formats

2 min read

An Overview of the Different Key Block Formats

A key block is a unique piece of cryptography that is used to protect cryptographic keys while they are being sent over networks that might not be...

Read More
Payment & Banking: An Introduction to z/OS and the IBM Common Cryptographic Architecture

4 min read

An Introduction to z/OS and the IBM Common Cryptographic Architecture

IBM’s mainframe computers have been a rock-steady part of banks’ security infrastructure for many years. Originating from the local data-center...

Read More
White smartphone and a black tablet lying on an open laptop, being used to research the digital Signature Activation Protocol

3 min read

Introducing the Digital Signature Activation Protocol for Remote Server Signing

This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...

Read More

4 min read

Tokenization and Securing Mobile Payments Apps

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. In 2017,...

Read More
Horses galloping across a field, rendered in black and white representing the speed and reliability of remote electronic signature services

4 min read

Remote Electronic Signatures: How to Improve Performance and Scalability

National digital signature schemes that utilize remote electronic signature technology can achieve very high usage rates, whereas Trust Service...

Read More
Understanding the IBM CCA key format and the importance of banking-grade key management

3 min read

Understanding IBM CCA & the Importance of Banking-grade Key Management

The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial...

Read More
The Conveyancing Association & Qualified Electronic Signatures

2 min read

UK Survey Reveals the Need for eIDAS Qualified Electronic Signatures

The Conveyancing Association (CA) in the UK has revealed the findings of its 2022 Lender Survey, which it strongly believes will assist in...

Read More

2 min read

NIST Post-Quantum Cryptography Standardization: SIKE Bites the Dust

Just a month ago, NIST announced its selection of three digital signature algorithms and one key establishment mechanism (KEM) for future use in...

Read More

3 min read

Advantages of Centralized Key Management

Traditionally, end-to-end lifecycle key management was achieved through inefficient paper-based procedures and highly resource intensive tasks...

Read More

3 min read

7 Tips for Correct Usage of Encryption to Secure eGovernment Processes

Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last...

Read More

3 min read

How to Deploy and Manage Cryptography in a Project the Right Way

With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...

Read More
What You See Is What You Timestamp – A Cost-Effective Acceptance Method to Guarantee Non-repudiation document acceptance for Legal Archiving Purposes

2 min read

What You See is What You Timestamp: An Attractive Alternative to QES

In this article, we proposeWhat-You-See-Is-What-You-Timestamp (WYSIWYT) as an attractive alternative to Qualified Electronic Signatures, for certain...

Read More

5 min read

Which Industry Sectors MUST Use Electronic Signatures?

Certain industries have a necessity to protect confidential information as well as a requirement for authentication - proving that a document was...

Read More

3 min read

NIST Releases Quantum-Resistant Cryptography Standards. Act Now!

An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of...

Read More
Converting Key Blocks from one to another One Format to Another: How It’s Done and in Which Sectors

2 min read

How to Convert Key Blocks

There are several types of key block formats used in different industries, especially the retail banking industry. The systems that use these key...

Read More
Good key management for financial services: protecting your digital assets from the inside out

3 min read

Key Management in FS: Protecting Your Digital Assets, Inside and Out

Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside...

Read More
Banks, Ecosystems & Service Innovation - Aligning the Crypto Architecture around MS Azure and Dynamics?

5 min read

FS Innovation: Aligning Crypto Architecture Around MS Azure & Dynamics

This article explores the concept of financial service platforms and aligns resulting business (process) goals with the necessary crypto...

Read More
psd2-gateway-for-secure-banking-with-eidas-cryptomathic

3 min read

Integrating PSD2 and eIDAS

With the introduction of PSD2, banks are forced to provide third party payment service providers (PSPs) with access to the bank’s customers’ account...

Read More
Resolving Common Pain Points of Key Management

5 min read

Resolving Common Pain Points of Key Management

Many organizations struggle with cryptographic key management for multiple reasons. However, these pain points can be resolved with the right tools.

Read More
Payment Security - Cardholders

4 min read

EMV Payment Security - Cardholders

Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment...

Read More

2 min read

4 Reasons How Banks Should Use Cryptography To Become Digitally Agile

For traditional banks to rise above the competition they face from big tech, neobanks, and fintech, they need to add new digital skills to their...

Read More
e-Health-in-the-Cloud-eIDAS-Cryptomathic

3 min read

eIDAS and the eHealth Governance Initiative

The healthcare market in Europe is valued at more than USD 2 trillion and is projected to increase due to the aging population not just in the EU but...

Read More
eIDAS-printout-banner

2 min read

The eIDAS-compliant Printout of a Digitally Signed Document

This article describes a model that could enable an electronically signed document to be printed out and used as an original in legal proceedings, in...

Read More
Secure Hardening for Mobile Banking Apps: Data Obfuscation

3 min read

Secure Hardening for Mobile Banking Apps: Data Obfuscation

When developing an application for mobile banking, application hardening using code obfuscation is one possible way of protecting sensitive data....

Read More
The Union Jack atop a flagpole seen against a blue sky with fluffy white clouds

5 min read

Qualified Digital Signing and Electronic Signature UK Law

This article aims to demystify electronic signature UK law and explain how it supports all types of electronic transactions in accordance with UK...

Read More
Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

5 min read

Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...

Read More
eIDAS: How Greater Interoperability Enables Business Cooperation

2 min read

eIDAS: How Greater Interoperability Enables Business Cooperation

eIDAS will not only usher in a new era of innovation and transparency in how organizations do business, but this regulation is also paving the way...

Read More
PSD2-eIDAS-Distributed-Authentication

8 min read

The PSD2 - Directive and Distributed Authentication

PSD2 breaks up the ways in which banks do their business, by forcing them to open up their APIs. By doing so, PSD2 challenges the way in which data...

Read More
Crypto-Agility: The Real Gold (Standard) at the End of the Rainbow

3 min read

Crypto-agility: The Gold at the End of the Rainbow for NIST PQC

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...

Read More

4 min read

Cloud encryption: Bring Your Own Key is no longer enough

Encryption key management systems are now essential for all companies needing to lockdown data in the cloud, says Matt Landrock, CEO, Cryptomathic...

Read More
Diagram that shows how to integrate an eIDAS Qualified Remote Signing solution with other business systems

3 min read

How to Integrate eIDAS Qualified Remote Signing Tools with Your Systems

The demand for remote digital signatures to enhance security and customer experience continues to grow across the EU, as the banking and financial...

Read More
ANSI X9.24-1-2017: Key Replacement, Destruction, and Archiving

2 min read

ANSI X9.24-1-2017: Key Replacement, Destruction, and Archiving

One aspect of key management is dealing with what happens when a symmetric cryptographic key is no longer needed. The section ‘Key Replacement,...

Read More

2 min read

Regain Control of Cryptographic Keys with Centralized Key Management

This article describes from a CISO perspective how to manage and protect security assets in large organisations, i.e. the cryptographic keys and...

Read More
4-pillars-of-eIDAS-Cryptomathic

3 min read

The four pillars of eIDAS

The eIDAS regulation sets the standard for electronic identification, electronic signatures, and trust services. It paves the way for delivering...

Read More
eidas-compliance-signing

2 min read

Signing the way to eIDAS Compliance

With the advent of comprehensive regulatory standards for digital signatures, remote electronic signatures within the EU is now possible for...

Read More
eIDAS-and-PSD2-1

4 min read

Bridging a link between PSD2 and eIDAS

Following the revised Payment Service Directive (PSD2), banks in the EEA are required to enable their customers (users) to grant third party...

Read More

2 min read

How Qualified Electronic Signing is Disrupting Digital Mortgages

In the last few years, a number of digital mortgage lenders have entered the market. These lenders have been described as ‘disruptive’ - entering...

Read More
eIDAS-Banking-Digital-Identity-Cryptomathic

3 min read

Digital Identity and eIDAS in Banking

The eIDAS Regulation lays the groundwork for creating a robust digital identity framework. The idea is to provide EU citizens with a secure, robust...

Read More
Summary of the Practical Key Management Challenges Behind Symmetric Cryptography in Financial Institutions 

3 min read

Symmetric Cryptography in Financial Institutions: Key Management Challenges

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...

Read More

3 min read

Banking-grade Key Management: From On-premises to Multi-cloud BYOK

In this article, we will look at integration points and explain why it is important that a key management system is able to integrate with a number...

Read More
ANSI X9.24-1-2017: Key Loading

2 min read

ANSI X9.24-1-2017: Key Loading

The ANSI X9.24-1-2017 standard defines the requirements for the loading of key components or shares, and the loading of cleartext keys. The loading...

Read More
NIST PQC Finalists Update: It’s Over For The Rainbow

4 min read

NIST PQC Finalists Update: It’s Over For The Rainbow

Last month, one of the three NIST finalists for post-quantum signature schemes received its final nail in the coffin: Ward Beullens, a PostDoc at IBM...

Read More
When Will Quantum Computing Arrive and How Will It Impact Cybersecurity?

4 min read

What is Quantum Computing And How Will It Impact Cybersecurity?

For years, there has been persistent chatter that quantum computing is coming and that organizations should be prepared for its arrival. But what...

Read More
Code-signing-cryptomathic

3 min read

Achieving Software Integrity Through Centralized Code Signing

The phrase “…Software is eating the world.” was famously used by Marc Andreessen in a WSJ article in 2011. No one could argue that software has...

Read More
An 'open' sign hanging in a shop's glass door

2 min read

UK eIDAS and EU eIDAS: Implications for Cross-Border & Digital Transactions

The eIDAS Regulation (No 910/2014) (EU eIDAS) came into force in 2016. It created a Europe-wide legal framework for electronic identification,...

Read More
Crypto-Agility in the Advent of Post Quantum Computing

5 min read

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...

Read More
Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

3 min read

Examining the NIST's Post-Quantum Cryptography Standardization Process

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...

Read More
What's_in_a_name_mathematics.jpg

2 min read

Q: What's in a Logo? A: Mathematics

Maybe you have wondered where our logo comes from and what it actually means. If you have, we hope the following will answer these questions. Just as...

Read More
Steps to reach crypto agility to get prepared for quantum computing

3 min read

Steps to reach crypto agility to get prepared for quantum computing

As the scientific community continues to push towards achieving quantum computing on a mass scale, smart companies are busy making preparations for...

Read More

2 min read

Why Emulator Detection is Essential for Mobile Banking and Payment App Security

Attacks on mobile banking and payment applications frequently begin with the use of an emulator for the mobile operating system, where the targeted...

Read More
A group of people in a public space using their smartphones, perhaps to access a mobile e-signature solution

6 min read

How to Enable Legally Binding Mobile E-signatures On Your device

The ever-growing number of applications and uses for mobile devices has long been a hot topic. Using mobiles to electronically sign transactions and...

Read More

2 min read

eIDAS and PSD2 – A perfect symphony in the digital marketplace?

The European Union is leading the way in the move towards the creation of a single digital market. There are many advantages a digital business has...

Read More
38526157131_3fa8f990df_k

7 min read

Cryptographic Key Management - the Risks and Mitigation

With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...

Read More
Manage, Handle and Control Your Own Key in the MS Azure Key Vault

3 min read

Manage, Handle and Control Your Own Key in the MS Azure Key Vault

Microsoft’s Azure Key Vault Managed HSM allows customers to safeguard their cryptographic keys for their cloud applications and be...

Read More
HSMs-in-Cryptography-Cryptomathic-1

5 min read

Turning Cryptography into a Service - Part 2

Part 2 – Accelerating Time-to-Market With the increase in e-commerce and electronic communications on the one hand and the growing challenges of...

Read More
Payment & Banking Cryptography: An Overview of the Benefits of z/OS and the Z Platform

4 min read

Payment & Banking Cryptography: The Benefits of z/OS & the Z Platform

This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for...

Read More
Spectre-Meltdown

2 min read

Meltdown & Spectre – What you Need to Know about Protecting your Keys

A number of serious security vulnerabilities, collectively known under the names of “Meltdown” and “Spectre” [1][2], have recently been discovered in...

Read More
InteroperabilityFramework-EIF-Cryptomathic.png

3 min read

What the European Interoperability Framework & eIDAS Means for You

The European Interoperability Framework (EIF) adopted in 2017 is the primary thrust in the EU’s effort to improve the efficiency of public service...

Read More
Digital signature deployment models for banking - Operating as an eIDAS Compliant Registration Authority Reduces Costs and Preserves Customer Ownership

3 min read

How Digital Signature Deployment Models Optimise eIDAS Implementation

The eIDAS regulation provides both the technical and legal framework for electronic identification and digital signatures that the banking sector...

Read More

2 min read

Top 5 Protective Measures for Key Management Systems and Malware

Malware infections have become more evolved and sophisticated. Similarly, the technologies for preventing malware threats and attacks have evolved to...

Read More
Using_a_centralized_key_management_system_to_enforce_information_security_policies.jpg

2 min read

How to Use a Centralized KMS to Enforce Information Security Policies

A Key Management System (KMS) must be designed in a manner that supports the goals of each organization using the KMS. The aim of a security policy...

Read More
Common Key Management System Models for the Cloud

5 min read

Common Key Management System Models for the Cloud

This article explains the four primary cloud KMS pattern combinations and which are best suited for use with Cryptomathic’s Key Management System...

Read More

2 min read

The Advantages of Automated Key Management

The use of cryptography is the foundation for the secure processing of financial and other electronic transactions. On the other hand, the management...

Read More
eIDAS Trust Services – Strengths and Challenges in Implementation

3 min read

eIDAS Trust Services – Strengths and Challenges in Implementation

A study published in early 2018 by the European Union Agency for Network and Information Security (ENISA), revealed that 90% of the respondents...

Read More
Why a Key Management System Must Understand ANSI X9.24/TR-31 Key Blocks

3 min read

Why Key Management Systems Must Understand ANSI X9.24/TR-31 Key Blocks

The PCI Council requires most actors of payment networks to implement ANSI X9.24/TR-31-compliant key blocks to wrap and securely transmit, transfer,...

Read More

5 min read

The Weakest Link in Many Cryptosystems - Part 2 of 2

RSA, a short recap In a public key scheme, and for the sake of simplicity, assume a public scheme based on encryption-decryption (as opposed to e.g....

Read More
What_is_the_right_user_interface_for_a_key_management_system.jpg

2 min read

What is the right user interface for a Key Management System?

User interface design and usability are the deciding factors in attaining a good user experience for most IT deployments, including key management...

Read More
Understanding the Concepts of Bring Your Own Key

3 min read

Understanding the Concepts of Bring Your Own Key

Bring your own key (BYOK) is a popular term relating to key management for cloud applications. However, a lack of standardization makes it confusing...

Read More
IBM's z15 Mainframe - Security, Resilience and Secure Key Management for Financial Service Platforms

4 min read

IBM z15 Mainframe & Secure Key Management for FS Platforms

Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...

Read More
Building Security Systems for the Internet of Things and Crypto Agility

4 min read

Crypto Agility and IoT: Building Security Systems

There is no silver bullet when it comes to securing “the” Internet of Things; instead, a careful analysis of the individual application is needed. In...

Read More
Differentiating between managing the lifecycle of cryptographic keys, protecting the keys and using the keys

3 min read

Differentiating Between Cryptographic Key Management, Protection & Use

The modern world of cybersecurity can be a confusing place. There are tons of data, regulations, and mandates in addition to the complex technical...

Read More
Tokenization-will-reduce-false-declines

4 min read

How Tokenization May Reduce False Declines

This article discusses how tokenization may reduce false declines with credit card transactions that could negatively impact merchants.

Read More
eidas-impact-cryptomathic

3 min read

Examining the Impact of eIDAS - Part 2

In Part 1 of our series exploring the wide footprint of the eIDAS regulation, we looked at things like PSD2, the European Citizen’s Initiative, and...

Read More
crypto-abstraction-layer

3 min read

What is a Crypto-Abstraction Layer?

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...

Read More
How to Improve HSM Usability ?

2 min read

How to Improve HSM Usability

In this article, we will explore some of the reasons why HSMs can be difficult to use and look at a novel solution that helps to overcome these...

Read More
Introduction to Cryptographic Key Blocks - FAQs

2 min read

Introduction to Cryptographic Key Blocks - FAQs

This article proposes answers to a series of frequently asked questions (FAQs) about key blocks.

Read More
commoncriteria_logo

3 min read

How Common Criteria Helps Organizations Choose the Right HSM

Hardware Security Modules (HSMs) are used in all card payment systems (as well as various other applications that require strong security) to protect...

Read More
Banking-without-borders.jpg

2 min read

eIDAS - Enabling Banking Without Borders

The European Single Market has made it possible for large companies and small businesses to freely access one of the biggest unified markets in the...

Read More
How Cryptomathic Signer differs from other eIDAS compliant remote signing solutions

3 min read

Signer: The Most Advanced, eIDAS-compliant Remote Signature Solution

As part of the global drive for digital transformation, legally binding digital signatures are at the forefront of many businesses’ ambitions to...

Read More
eIDAS-Toolbox-Cryptomathic

4 min read

The eIDAS Toolbox's - Case Studies from Various Industries (Part 2)

In Part 1 of our series, we covered some simple case studies from the financial services sector and the logistics and trade sectors. We looked at...

Read More
All Trains Cancelled: How an e-Signature Failure Derailed a €3bn Swiss-Austrian Transport Deal

6 min read

How an e-Signature Failure Derailed a €3bn Swiss-Austrian Transport Deal

Last week order for 186 double-decker trains was nullified due to a legal formality surrounding the Qualified Electronic Signature used to ink the...

Read More
Methods_of_maximizing_the_security_protection_of_a_cryptographic_system.jpg

5 min read

Maximizing Payment Card Industry (PCI) & Cryptographic System Security

This article talks about how different factors and controls can affect the strength and effectiveness of a cryptographic system's security. It gives...

Read More
eIDAS-and-Fintechs-benefits

3 min read

How FinTechs can benefit from the European eIDAS Regulation

The financial service industry has always been innovator in technology adoption. This is not surprising considering the nature of the industry with...

Read More
eIDAS and the Globalisation of Trust

3 min read

eIDAS and the Globalisation of Trust

Globalization has continued its inexorable march over the last decades. The movement of everything from capital, labor, ideas, goods, and services...

Read More
Where_2FA_and_PKI_meet.jpg

4 min read

Where 2FA and PKI Meet

Under pressure from sophisticated attacks and rising fraud, many B2C organisations of the financial industry are currently enhancing the static...

Read More
ANSI X9.24-1-2017: Key Utilization and Storage

3 min read

ANSI X9.24-1-2017: Key Utilization and Storage

This article briefly summarizes the symmetric cryptographic key utilization and storage requirements as described by the ANSI X9.24-1-2017 (part 1)...

Read More
Digital-trade-case-study.jpg

2 min read

Case Study – Fully digital trade transactions

Great strides have been made in the retail banking and payments space via innovative financial technology products. However, in the corporate banking...

Read More
eIDAS-BankID-Cryptomathic

3 min read

Leading the Digital Change, Part 3 – Successful Collaborations

In Part 2 of our series on the success of electronic IDs in the Nordic countries, we looked at what has made these schemes so successful with near...

Read More
epassport_inspection_the_need_for_speed.jpg

6 min read

epassport inspection: The Need for Speed

Ever since the EU mandated the introduction of biometric ePassports containing fingerprints there has been a flurry of technology development and...

Read More
Issuing_MULTOS_cards.jpg

4 min read

Issuing MULTOS Cards

MULTOS cards are being deployed in steadily increasing numbers and Cryptomathic is delighted to be involved in MULTOS projects across the globe....

Read More
Payment & Banking: Why IBM z/OS Needs a Banking-grade KMS for the Hybrid Cloud

3 min read

Why IBM z/OS Needs a Banking-grade KMS for Hybrid Cloud

The IBM mainframe series (“z-series”) has become a backbone for security, privacy and resilience in a large share of payment and banking related...

Read More
Thales Key Blocks

3 min read

How to use Thales Key Blocks in payShield HSMs

Thales Key Blocks are an essential cryptographic key wrapping format. In comparison to other key block formats, they are proprietary and only work...

Read More
anti-money-laundery-eidas-cryptomathic.png

3 min read

Bridging the gap between eIDAS and Anti-Money Laundering Directives

Banks and other financial institutions are playing a key role in countering global challenges like money laundering and terror financing.

Read More
Nordic-countries-eIDAS

3 min read

Leading the Digital Change, Part 2 – Turning eIDs into universal tools

In our previous article on eID schemes in Nordic countries, we looked at some data showcasing the remarkable adoption and engagement rates for such...

Read More
Cryptomathic CKMS: Centralized & Automated Key Management for payShield HSMs

2 min read

Cryptomathic CKMS: Centralized, Automated Key Management for payShield

Banks and financial institutions must adhere to a rigorous set of security and regulatory practices to protect data, communications, and processes.

Read More
federated-signing-cryptomathic

3 min read

Federated Signing for Online Customer Onboarding

This article examines how federated signing can help banks overcome some of the obstacles they face when onboarding customers online in the era of...

Read More
Choosing the right key-management-system across the hybrid cloud

3 min read

Selecting the Right Key Management System

The protection and secure management of cryptographic keys is crucial for ensuring that cryptography is used in the most effective way to keep data...

Read More
eIDAS-Onboarding-the-process

3 min read

eIDAS – Digitisation of the on-boarding process Part 2 - The Process

In Part 1 of this series, we looked at the objectives or motives behind having an eIDAS-enabled digital onboarding process. In Part 2, we look at the...

Read More
Attacks on PDF Certification and the impact on Approval Signatures

3 min read

Attacks on PDF Certification and the impact on Approval Signatures

In May 2021, researchers published two attacks on certified PDFs, which enabled unintentional and fraudulent modifications to be applied to signed...

Read More
1 2