CRYPTOMATHIC BLOG

 

When Will Quantum Computing Arrive and How Will It Impact Cybersecurity?

4 min read

What is Quantum Computing And How Will It Impact Cybersecurity?

For years, there has been persistent chatter that quantum computing is coming and that organizations should be prepared for its arrival. But what...

Read More
Code-signing-cryptomathic

3 min read

Achieving Software Integrity Through Centralized Code Signing

The phrase “…Software is eating the world.” was famously used by Marc Andreessen in a WSJ article in 2011. No one could argue that software has...

Read More
An 'open' sign hanging in a shop's glass door

2 min read

UK eIDAS and EU eIDAS: Implications for Cross-Border & Digital Transactions

The eIDAS Regulation (No 910/2014) (EU eIDAS) came into force in 2016. It created a Europe-wide legal framework for electronic identification,...

Read More
Crypto-Agility in the Advent of Post Quantum Computing

5 min read

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...

Read More
Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

3 min read

Examining the NIST's Post-Quantum Cryptography Standardization Process

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...

Read More
What's_in_a_name_mathematics.jpg

2 min read

Q: What's in a Logo? A: Mathematics

Maybe you have wondered where our logo comes from and what it actually means. If you have, we hope the following will answer these questions. Just as...

Read More
Steps to reach crypto agility to get prepared for quantum computing

3 min read

Steps to reach crypto agility to get prepared for quantum computing

As the scientific community continues to push towards achieving quantum computing on a mass scale, smart companies are busy making preparations for...

Read More

2 min read

Why Emulator Detection is Essential for Mobile Banking and Payment App Security

Attacks on mobile banking and payment applications frequently begin with the use of an emulator for the mobile operating system, where the targeted...

Read More
A group of people in a public space using their smartphones, perhaps to access a mobile e-signature solution

6 min read

How to Enable Legally Binding Mobile E-signatures On Your device

The ever-growing number of applications and uses for mobile devices has long been a hot topic. Using mobiles to electronically sign transactions and...

Read More