CRYPTOMATHIC BLOG

 

Cryptomathic joins the Cloud Signature Consortium

2 min read

Cryptomathic joins the Cloud Signature Consortium as Executive Member

As a leader in qualified remote signing, Cryptomathic is pleased to announce that it has joined the Cloud Signature Consortium (CSC), a global group...

Read More

4 min read

IBM CCA: Hybrid Cloud & Key Management for Financial Service Platforms

In response to changing and more dynamic market demands, banks and financial institutions are turning into financial service platforms. They increase...

Read More
EMV Payment Security - Acquirers

4 min read

EMV Payment Security - Acquirers

In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating...

Read More

2 min read

How to implement efficient Key Management in a Legacy Infrastructure

This article discusses the various issues around key management and presents Cryptomathic’s approach to central key and crypto management that has...

Read More
Digital Signatures vs Wet Signing: The Implications Of Alleged Forged Signatures During The Home Buying Process

3 min read

Digital vs Wet Signatures: The Impact of Forgery On House Buying

Mortgage fraud is a serious crime. Once executed and signed, a mortgage deed is a legally binding contract. The responsibility of trying to prove...

Read More
Agile Cryptography for Turnaround Business Models of Retail Banks

5 min read

Agile Cryptography for Turnaround Business Models of Retail Banks

Going forward, it is imperative for existing banks to develop a strategy for sustaining their current operations and expanding in a digitized,...

Read More

3 min read

Schrems II Slows AWS Adoption for Danish Education & Pension Services

For over two years, the Schrems II decision from the European Court of Justice has caused tremors in IT departments across EU countries, such as...

Read More

5 min read

Beyond the Video-Ident Hack: Securely Sign with a Smile

For trustworthy remote identity verification, a proof of the authenticity of the identity card and of the integrity of its contents is needed, along...

Read More
What Do Companies Perceive as the Most Important Encryption Features?

5 min read

What Do Companies Perceive as the Most Important Encryption Features?

The need for certain encryption technology features can vary from company to company, depending on their individual needs for securing their data.

Read More