2 min read
The SolarWinds attack and best practices for code-signing
Since the announcement of the SolarWinds supply chain attack, intensive analysis has been done by Crowdstrike, FireEye (with additional details),...
2 min read
Since the announcement of the SolarWinds supply chain attack, intensive analysis has been done by Crowdstrike, FireEye (with additional details),...
3 min read
In this article, we look at the process of a keyshare generator and key derivation as described by the ANSI X9.24-1-2017 standard. This process is...
5 min read
This article discusses the concerns surrounding key management for cloud environments and how Cryptomathic addresses them by bringing banking-grade...
2 min read
People often use the terms e-signature and digital signature interchangeably. However, they aren't the same thing. Everything from the processes that...
5 min read
An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...
2 min read
We are constantly reminded by news stories how complex it can be to secure mobile banking and payments apps. A recent study has found that 11%...
3 min read
The term PAdES stands for PDF Advanced Electronic Signatures. It refers to a group of extensions and restrictions that are used with PDF and ISO...
3 min read
Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...
3 min read
The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...