CRYPTOMATHIC BLOG

 

3 min read

How Prepared are Companies for Quantum Computing Cybersecurity Risk?

This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current...

Read More
Great white shark gliding lazily beneath the ocean, symbolising malware threats to mobile banking apps

5 min read

Understanding Malware Protection for Mobile Banking Apps

To bank safely online, you need additional mobile app security mechanisms that go beyond standard OS security features. In this article, we take an...

Read More

3 min read

Mobile Banking Application Protection: Challenges and Techniques

As the use of mobile phones for mobile banking and payment applications increases, so too do the security threats. Most smartphones use only two...

Read More
TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

4 min read

TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated. The TR-34 norm is an implementation of the...

Read More

3 min read

EU AWS Hosting: Data Sovereignty & GDPR Compliance

This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.

Read More
Explaining the Java ECDSA Critical Vulnerability

3 min read

The Java ECDSA Vulnerability: What You Need to Know

On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.

Read More
PCI PIN Requirements for Key Blocks in the Payment Card Industry - FAQs

3 min read

FAQs on PCI PIN Key Blocks & Their Requirements

This article proposes a few answers to a series of frequently asked questions (FAQs) about key blocks and their use with PCI.

Read More

3 min read

What is a Secure Signature Creation Device?

As defined by Regulation (EU) No 910/2014 (eIDAS), which took effect on 1 July 2016, an electronic signature creation device is software or hardware...

Read More
Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

5 min read

Crypto Service Gateway: Enabling Crypto-Agility with CSG Policy Engine

Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.

Read More