CRYPTOMATHIC BLOG

 

4 min read

Will The UK Follow The EU On Digital Identities?

The UK's relationship with the EU has been tumultuous in recent years, especially in the wake of Brexit. With regards to digital identities, former...

Read More

2 min read

Get More Control Of Your Data In The Cloud With Cryptomathic's BYOK Service

Cloud computing brings many benefits to enterprise businesses; easily scalable, cost-effective and resilient, cloud computing enables rapid...

Read More

4 min read

Exploring The EMV Personalization Process

EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card...

Read More

5 min read

Protecting the European Digital Identity Wallet

The European Commission promotes the European Digital Identity wallet (EUDI wallet) as part of its effort to digitize the economy and help foster...

Read More
How Bring Your Own Key Can Provide Schrems II Compliance for AWS-Hosted Data

4 min read

How BYOK Provides Schrems II Compliance for AWS-hosted Data

Companies who use Amazon Web Services (AWS) often choose to do so because of its scalability, ease of use and lower costs than other services or...

Read More

3 min read

Why 2023 is the year to become PQC-ready

2022 was a big year in the cryptographic security community. If you don’t have news alerts set up for the latest updates on Post-Quantum Cryptography...

Read More

4 min read

What Does Quantum Computing Mean For Data Protection?

The threat of quantum computers is real and it could mean the end of encryption as we know it. Quantum computers are capable of performing...

Read More

2 min read

NIST Picks Lightweight Cryptography Algorithms to Secure Small Devices

Security experts from the National Institute of Standards and Technology (NIST) have declared Ascon - a group of cryptographic algorithms - as the...

Read More

3 min read

Secure BYOK Service for AWS S3 Buckets

Keeping data safe in the Cloud has always been a concern for users, hence the need for encrypting data. With more businesses taking advantage of what...

Read More