This article explains the Signature Activation Protocol in the context of eIDAS-compliant central signing. It sheds lights on its purposes and outlines its implementation for remote/central signature servers.
This article explains the Signature Activation Protocol in the context of eIDAS-compliant central signing. It sheds lights on its purposes and outlines its implementation for remote/central signature servers.
Cryptomathic has completed a successful integration of its centralized HSM and cryptography management platform, Crypto Service Gateway (CSG), with the CyberArk Identity Security platform in a live setting at an unnamed tier-one German bank.
On the 9th of November, the Aarhus company Cryptomathic was awarded the Initiative Prize by the regional division of DI (Confederation of Danish Industry).
Cryptomathic's partner and mobile security expert, ARXAN, has published the 5th annual State of Application Security Report, which takes an in-depth look into the security of some of the most popular mobile finance applications currently available.
The report finds a huge discrepancy between consumer confidence regarding the level of security built into these apps and the degree to which developers of these apps actually address known application vulnerabilities. For example, 86% of the surveyed app users feel their applications are adequately secure.Still, more than 90% of the applications that were tested showed multiple flaws. Here is an infographic that shows some of the most important parts of the report.
In 2009, the RBS WorldPay ATM network reportedly lost $9 million to a 30 minute fraud attack across 49 cities, in different countries, using just 100 cloned cards. On the face of it, the $9 million dollar yield from the attack is a large enough figure to make headline news, but perhaps not that shocking in this day and age where the total UK card fraud exceeded £500 million in the past year, according to APACS figures. What is possibly more serious in this particular scenario is the method