CRYPTOMATHIC BLOG

 

2 min read

Hard Truths About Hardware: EUDI Wallet Needs More Than Secure Chips

Mobile phones are increasingly vulnerable to hacking and fraud, presenting significant challenges for securing sensitive applications like the EUDI...

Read More

2 min read

Reviewing the EUDI Wallet Reference Implementation Code

The EUDI wallet reference implementation serves as a practical guide for developers to create secure digital identity management solutions based on...

Read More

3 min read

Key Vulnerabilities of the EUDI Wallet Solution Reference Architecture

The EUDI (European Digital Identity) wallet solution reference architecture (ARF) is designed to provide a secure framework for managing digital...

Read More

2 min read

Cryptomathic Signer & KeyCloak Integration for eIDAS-Compliant Signing

To deliver trust services, managing user´s identities and access is paramount. eID schemes and trust service providers all require IdP solutions for...

Read More

3 min read

7 Top strategies to secure mobile-first consumer-driven banking

North America is catching up fast to the open banking initiatives that are currently thriving across Europe, South America and Asia Pacific. As...

Read More

1 min read

Cryptomathic Welcomes Edmundo Diaz as New Sales Director

Cryptomathic is delighted to welcome Edmundo Diaz as its new Sales Director for Southern Europe, Africa and Latin America (LatAm). Edmundo’s...

Read More

1 min read

Azure Data Security with External Key Management & BYOK

Data security can be complex, but it's essential in today's business world, especially when using cloud services. One effective approach is adopting...

Read More

1 min read

New Sales Director Joins Cryptomathic North America Team

Cryptomathic further bolsters its leadership team, welcoming Davin Cooke as Sales Director for the company’s North American operations.

Read More

2 min read

Readiness through HSM and Post-Quantum Key Management

In today's fast-evolving digital landscape, robust key management has become an essential part of securing sensitive data and communications. The...

Read More