CRYPTOMATHIC BLOG

 

CSG (3)

crypto-abstraction-layer

3 min read

What is a Crypto-Abstraction Layer?

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...

Read More
How to Improve HSM Usability ?

2 min read

How to Improve HSM Usability

In this article, we will explore some of the reasons why HSMs can be difficult to use and look at a novel solution that helps to overcome these...

Read More
Cryptomathic Integrates with CyberArk to Enable HSM-as-a-Service in Tier-One German Bank

1 min read

Cryptomathic Integration Enables HSM-as-a-Service at German Bank

Cryptomathic has completed a successful integration of its centralized HSM and cryptography management platform, Crypto Service Gateway (CSG), with...

Read More
Misuse of X.509 Certificates & Keys Involved in SolarWinds Attack

3 min read

Misuse of X.509 Certificates & Keys Involved in SolarWinds Attack

This article discusses the misuse of X.509 certificates and keys in the SolarWinds attack and how Cryptomathic CKMS and CSG could help protect...

Read More
The SolarWinds attack and best practices for code-signing

2 min read

The SolarWinds attack and best practices for code-signing

Since the announcement of the SolarWinds supply chain attack, intensive analysis has been done by Crowdstrike, FireEye (with additional details),...

Read More
What is Quantum Computing and how does it relate to today’s Cryptography Infrastructure Investments

3 min read

Quantum Computing and Cryptography Infrastructure Investments

The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...

Read More
Dancing-Men

4 min read

Tokenization in Banking and Financial Services

Tokenization is a generalized concept of a cryptographic hash. It means representing something by a symbol (‘token’).

Read More

3 min read

The SHA-1 Attack Further Emphasizes the Need for Crypto-Agility 

The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is...

Read More

3 min read

SHA-1 is Practical and Cost-Effective to Crack Now

This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.

Read More