CRYPTOMATHIC BLOG

 

5 min read

The evolution of zero-trust security

The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires...

Read More

4 min read

How Cryptomathic's Mobile App Security Core Protects the EUDI Wallet

Cryptomathic Mobile App Security Core (MASC) is a comprehensive security software solution for the European Digital Identity (EUDI) wallet, eID apps,...

Read More
EUDI Wallet for payments

1 min read

Banks Ask EU to Reconsider Inclusion of Payments in EUDIW Legislation

The European Digital Identity Wallet (EUDIW) has the potential to serve as a comprehensive identity gateway, enabling individuals to manage their...

Read More

3 min read

Bring Your Own Key (BYOK) as Part of Your Company's Data Security Strategy

The adoption of cloud computing has altered the approach organizations take toward security. Rather than concentrating on securing the perimeter of a...

Read More

4 min read

Why is Zero Trust Important?

Zero Trust security is a concept that has been discussed extensively. However, there are many different interpretations of what it means. Some...

Read More
Cryptomathic and Fidentity

2 min read

New Partnership : Cryptomathic and Fidentity

Cryptomathic is excited to announce that we have partnered with fidentity, an expert in online identity verification, to enable automated identity...

Read More

6 min read

Resources to Help You Develop and Test EUDI Wallet App Security

Itemizing the potential risks of the European Digital Identity (EUDl) Wallet scheme is a complex task that involves assessing the attack surface of...

Read More

3 min read

Threats to the EUDI Wallet App

The European Digital Identity wallet (EUDI wallet) is proposed by the European Commission to provide a secure, safe and standardized digital identity...

Read More

5 min read

Payment Fraud and Mitigation Trends in 2023

Merchants must remain vigilant against fraud and ensure they have the necessary tools to combat it. Failure to do so may render their fraud detection...

Read More