Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

3 min read

Advantages of Centralized Key Management

Traditionally, end-to-end lifecycle key management was achieved through inefficient paper-based procedures and highly resource intensive tasks...

Read More

3 min read

7 Tips for Correct Usage of Encryption to Secure eGovernment Processes

Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last...

Read More

3 min read

How to Deploy and Manage Cryptography in a Project the Right Way

With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...

Read More
Person in an apron clicking a green arrow on a large touchscreen display

5 min read

Electronic Signature Use Cases: Which Industries MUST Use E-signatures?

Certain industries have a duty to protect confidential information, as well as a requirement for authentication - proving that a document was sent by...

Read More

5 min read

Resolving Common Pain Points of Key Management

Many organizations struggle with cryptographic key management for multiple reasons. However, these pain points can be resolved with the right tools.

Read More

2 min read

The eIDAS-compliant Printout of a Digitally Signed Document

This article describes a model that could enable an electronically signed document to be printed out and used as an original in legal proceedings, in...

Read More
The Union Jack atop a flagpole seen against a blue sky with fluffy white clouds

5 min read

Qualified Digital Signing and Electronic Signature UK Law

This article aims to demystify electronic signature UK law and explain how it supports all types of electronic transactions in accordance with UK...

Read More

5 min read

Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...

Read More
PSD2-eIDAS-Distributed-Authentication

8 min read

The PSD2 - Directive and Distributed Authentication

PSD2 breaks up the ways in which banks do their business, by forcing them to open up their APIs. By doing so, PSD2 challenges the way in which data...

Read More