CRYPTOMATHIC BLOG

 

Key Management

2 min read

NIS2 succeeds NISD, and can now affect you too

Cryptomathic guides you towards compliance. EU Directive 2022/2555 on Network and Information Systems, also known as NIS2, entered into force on Jan...

Read More

1 min read

Secure-by-design key management for risk remediation against Storm-0558 type attacks

Over the course of a month in May/June 2023, hundreds of thousands of emails belonging to Microsoft customers were exposed to a hacker labelled...

Read More
High rise buildings- banking

3 min read

Cloud Data Security: Why Centralized Key Management is Vital for Banks

In today's digital era, banks are increasingly leveraging cloud and multi-cloud environments to drive operational efficiency. However, the security...

Read More

2 min read

Securing a Software-Defined Future in the Automotive Sector

For decades, cars have been equipped with multiple connected electronic control units (ECUs) that manage various functions like entertainment, route...

Read More

5 min read

Encryption for GDPR Compliance

Under the GDPR, organizations must take appropriate measures to protect personal data from unauthorized access, use, disclosure, or destruction. One...

Read More

4 min read

Exploring The EMV Personalization Process

EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card...

Read More
How Cryptomathic’s AWS BYOK Service Provides Secure Scalability, Durability, and Availability

3 min read

Cryptomathic AWS BYOK: Secure Scalability, Durability & Availability

In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must...

Read More
BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

3 min read

Why BYOK is Essential for Data Security and Privacy in the Cloud

The 2020 Oracle and KPMG Cloud Threat Report focuses on the key risks and challenges organizations face as they implement and maintain cloud...

Read More

5 min read

Customer Behaviour Drives Banking Security And Cryptography Architecture

Changing customer behaviour and expectations are driving the transformation of the new banking security architecture. While customers want more...

Read More