CRYPTOMATHIC BLOG

 

3 min read

Cryptomathic Innovates in mobile security by extending its MASC solution with an Insights Service -Reaction Engine

Cryptomathic is thrilled to announce a significant enhancement to our Mobile App Security Solution (MASC) offering with Insights Service. Insights...

Read More

4 min read

Choice of app protection approach affects how well protected is an app

The choice of app protection should not be taken lightly. Modern applications face numerous threats that evolve alongside advancements in...

Read More

1 min read

Unveiling Obsidian: The Next-Gen Payment Platform for the Cloud Era

We are delighted to announced the launch of Obsidian, a cutting-edge payment platform designed to meet the evolving needs of the payment industry....

Read More

7 min read

Quantum-Resistant Short-Lived Certificates

Short-lived certificates play a vital role in current infrastructures, finding a suitable quantum-resistant alternative to the currently used...

Read More

2 min read

Cryptomathic and PQShield form strategic alliance to offer PQC solutions for code signing and data protection in compliance with latest NIST and CNSA recommendations

Two foremost software security experts and pioneers in cryptographic agility and post-quantum cryptography join forces to offer comprehensive,...

Read More

4 min read

The Challenges of Certifying the EUDI Wallet: A Deep Dive

As the European Union solidifies the framework for the EUDI (European Digital Identity) wallet, the certification process outlined in the...

Read More

6 min read

Qualified Electronic Signatures – Best Practice Implementation of the Signature Activation Module (SAM)

This article evaluates the implementation options for the Signature Activation Module (SAM) in the context of eIDAS 2. Based on this analysis we...

Read More

2 min read

Hard Truths About Hardware: Why the EUDI Wallet Needs More Than Just Secure Chips

Mobile phones are increasingly vulnerable to hacking and fraud, presenting significant challenges for securing sensitive applications like the EUDI...

Read More

2 min read

Assessing the EUDI Wallet Reference Implementation Code

The EUDI wallet reference implementation serves as a practical guide for developers to create secure digital identity management solutions based on...

Read More