CRYPTOMATHIC BLOG

 

7 min read

WHAT IS AN ELECTRONIC SIGNATURE? HOW DOES IT DIFFER FROM DIGITAL SIGNATURES?

Were I to ask you what a handwritten signature looks like, with an air of confidence will you grab a pen and scrawl your name on a piece of paper,...

Read More

4 min read

Payments from a European Digital Identity (EUDI) Wallet

The European Digital Identity Wallet (EUDI Wallet) is at the forefront of the European Commission's eIDAS initiative to establish a secure and...

Read More
organizations are getting ready for the quantum security era

4 min read

PQC and How Organizations are Preparing for the Quantum Security Era

Quantum computers offer potential transformational power for organizations dealing with complex computational problems in various industries such as...

Read More

4 min read

How FinTech is Helping Build a More Sustainable Financial Future

Along with the increased convenience and security offered by digital payment technology, many consumers are now showing greater interest in...

Read More

5 min read

The evolution of zero-trust security

The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires...

Read More

4 min read

How Cryptomathic's Mobile App Security Core Protects the EUDI Wallet

Cryptomathic Mobile App Security Core (MASC) is a comprehensive security software solution for the European Digital Identity (EUDI) wallet, eID apps,...

Read More
EUDI Wallet for payments

1 min read

Banks Ask EU to Reconsider Inclusion of Payments in EUDIW Legislation

The European Digital Identity Wallet (EUDIW) has the potential to serve as a comprehensive identity gateway, enabling individuals to manage their...

Read More

3 min read

Bring Your Own Key (BYOK) as Part of Your Company's Data Security Strategy

The adoption of cloud computing has altered the approach organizations take toward security. Rather than concentrating on securing the perimeter of a...

Read More

4 min read

Why is Zero Trust Important?

Zero Trust security is a concept that has been discussed extensively. However, there are many different interpretations of what it means. Some...

Read More