CRYPTOMATHIC BLOG

 

2 min read

(re)Introducing Cryptomathic

A note from Laurent Lafargue, Global CEO If you’re reading this, you may have noticed a new look to the Cryptomathic website today! We’re very...

Read More

2 min read

Mobile Point of Sale Compliance – What is it all about?

PCI have recently released the new standard and compliance program for Mobile Payments on Commercial off-the-shelf devices (MPoC). This blog is the...

Read More

2 min read

eIDAS 2.0 – What’s New?

The European eIDAS regulation, short for the Electronic IDentification, Authentication and Trust Services Regulation, was created in 2014 to ensure...

Read More

2 min read

Demystifying Mobile Application Hardening: Techniques and Best Practices

What is Mobile Application Hardening? Mobile application hardening refers to the process of securing mobile applications against various threats and...

Read More

2 min read

More Post-Quantum Digital Signature Candidates!

On July 17, 2023, the National Institute of Standards and Technology (NIST) announced a new set of 40 candidates to compete in their Post-Quantum...

Read More
High rise buildings- banking

3 min read

Cloud Data Security: Why Centralized Key Management is Vital for Banks

In today's digital era, banks are increasingly leveraging cloud and multi-cloud environments to drive operational efficiency. However, the security...

Read More

2 min read

The European Digital Identity Wallet as a Means of Authentication

The European Commission, as part of the eIDAS 2.0 proposal promotes the European Digital Identity Wallet (EUDI Wallet) as an app that enables...

Read More

3 min read

AWS External Key Store (XKS) with the Crypto Service Gateway

AWS Key Management Service (KMS) has long provided cryptographic services to safeguard your AWS resources. This involves generating and managing keys...

Read More

3 min read

Cybersecurity Paradox: How Too Many Solutions Makes You Less Secure

Believing that more cybersecurity solutions increase safety is a common misconception. An overload of security measures can ironically generate more...

Read More