CRYPTOMATHIC BLOG

 

2 min read

E-signatures vs Digital Signatures: Key Differences and Regulations

People often use the terms e-signature and digital signature interchangeably. However, they aren't the same thing. Everything from the processes that...

Read More
Diagram showing the different layers of mobile app security

5 min read

Solving Common Mobile Banking Security Issues

An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...

Read More

2 min read

Protecting Mobile Banking & Payment Apps from Malicious Attacks

We are constantly reminded by news stories how complex it can be to secure mobile banking and payments apps. A recent study has found that 11%...

Read More

3 min read

PAdES Standards for Trust Service Providers

The term PAdES stands for PDF Advanced Electronic Signatures. It refers to a group of extensions and restrictions that are used with PDF and ISO...

Read More

3 min read

Mobile App Hardening: Root and Jailbreak Detection Techniques

Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...

Read More
What is Quantum Computing and how does it relate to today’s Cryptography Infrastructure Investments

3 min read

Quantum Computing and Cryptography Infrastructure Investments

The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...

Read More

3 min read

Best Practices for Digital Signature Services

With the ever-growing number of electronic transactions and documents, the use of digital signatures make it possible to trust and act upon these...

Read More

4 min read

Understanding the Certificate Authority in the Context of eIDAS

In this article, we will discuss the Certificate Authority (CA) in the context of eIDAS and what is required of this entity in ensuring the integrity...

Read More
An Overview of EBA's New Guidelines on ICT and Security Risk Management (EBA/GL/2019/04) in the Light of COVID-19

4 min read

EBA ICT & Security Risk Guidelines: A COVID-19 Perspective

Considering the COVID-19 impact on digitalization, EBA’s updated Guidelines on ICT and Security Risk Assessment will help focus on priority areas,...

Read More