CRYPTOMATHIC BLOG

 

Good key management for financial services: protecting your digital assets from the inside out

3 min read

Key Management in FS: Protecting Your Digital Assets, Inside and Out

Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside...

Read More
Banks, Ecosystems & Service Innovation - Aligning the Crypto Architecture around MS Azure and Dynamics?

5 min read

FS Innovation: Aligning Crypto Architecture Around MS Azure & Dynamics

This article explores the concept of financial service platforms and aligns resulting business (process) goals with the necessary crypto...

Read More
psd2-gateway-for-secure-banking-with-eidas-cryptomathic

3 min read

Integrating PSD2 and eIDAS

With the introduction of PSD2, banks are forced to provide third party payment service providers (PSPs) with access to the bank’s customers’ account...

Read More
Resolving Common Pain Points of Key Management

5 min read

Resolving Common Pain Points of Key Management

Many organizations struggle with cryptographic key management for multiple reasons. However, these pain points can be resolved with the right tools.

Read More
Payment Security - Cardholders

4 min read

EMV Payment Security - Cardholders

Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment...

Read More

2 min read

4 Reasons How Banks Should Use Cryptography To Become Digitally Agile

For traditional banks to rise above the competition they face from big tech, neobanks, and fintech, they need to add new digital skills to their...

Read More
e-Health-in-the-Cloud-eIDAS-Cryptomathic

3 min read

eIDAS and the eHealth Governance Initiative

The healthcare market in Europe is valued at more than USD 2 trillion and is projected to increase due to the aging population not just in the EU but...

Read More
eIDAS-printout-banner

2 min read

The eIDAS-compliant Printout of a Digitally Signed Document

This article describes a model that could enable an electronically signed document to be printed out and used as an original in legal proceedings, in...

Read More
Secure Hardening for Mobile Banking Apps: Data Obfuscation

3 min read

Secure Hardening for Mobile Banking Apps: Data Obfuscation

When developing an application for mobile banking, application hardening using code obfuscation is one possible way of protecting sensitive data....

Read More