Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

3 min read

How Prepared are Companies for Quantum Computing Cybersecurity Risk?

This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current...

Read More

3 min read

EU AWS Hosting: Navigating Data Sovereignty & GDPR Compliance

This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.

Read More

3 min read

What's a Secure Signature Creation Device (SSCD)?

As defined by Regulation (EU) No 910/2014 (eIDAS), which took effect on 1 July 2016, an electronic signature creation device is software or hardware...

Read More

3 min read

Digital vs Wet Signatures: The Impact of Forgery On House Buying

Mortgage fraud is a serious crime. Once executed and signed, a mortgage deed is a legally binding contract. The responsibility of trying to prove...

Read More

5 min read

E-Government Authentication & Signing: Centralized Solutions

Achieve Non-Repudiation of Origin (NRO) and Non-Repudiation of Emission (NRE)

Read More
Classification-cryptpgrapjic-keys

5 min read

Classification of Cryptographic Keys

This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...

Read More

3 min read

Introducing the Signature Activation Protocol for Remote Signing

This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...

Read More

3 min read

Advantages of Centralized Key Management

Traditionally, end-to-end lifecycle key management was achieved through inefficient paper-based procedures and highly resource intensive tasks...

Read More

3 min read

7 Tips for Correct Encryption Usage in eGovernment Processes

Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last...

Read More