CRYPTOMATHIC BLOG

 

5 min read

Protecting the European Digital Identity Wallet

The European Commission promotes the European Digital Identity wallet (EUDI wallet) as part of its effort to digitize the economy and help foster...

Read More
How Bring Your Own Key Can Provide Schrems II Compliance for AWS-Hosted Data

4 min read

How BYOK Provides Schrems II Compliance for AWS-hosted Data

Companies who use Amazon Web Services (AWS) often choose to do so because of its scalability, ease of use and lower costs than other services or...

Read More

2 min read

NIST Picks Lightweight Cryptography Algorithms to Secure Small Devices

Security experts from the National Institute of Standards and Technology (NIST) have declared Ascon - a group of cryptographic algorithms - as the...

Read More

3 min read

Secure BYOK Service for AWS S3 Buckets

Keeping data safe in the Cloud has always been a concern for users, hence the need for encrypting data. With more businesses taking advantage of what...

Read More
Cardholder, Merchant, Issuer & Acquirer - The Four Corners Model for Payment Security and Key Management

4 min read

The Four Corners Model for Card Payment Security and Key Management

The “Four Corners” model, also called the “Four Party Scheme”, is utilized in almost all standard card payment systems across the globe. Here, we...

Read More

3 min read

Get Quantum-Ready with Crypto Service Gateway

When it comes to preparing for post-quantum computing, the legacy mechanisms for effective implementation, integration, and management of...

Read More

4 min read

Exploring Digital Signing Services: What's Involved in Setting Them Up?

Digital transformation has been a critical focus for businesses and institutions prior to the pandemic. Digital documents and e-signatures are a...

Read More
How Cryptomathic’s AWS BYOK Service Provides Industry Grade Compliance

3 min read

How Cryptomathic’s AWS BYOK Service Provides Industry Grade Compliance

The AWS cloud is enjoying increasing popularity with its very high levels of scalability, durability, and availability. It releases companies from...

Read More

8 min read

Cybersecurity for connected vehicles

Vehicles today come with an array of convenience and safety features driven by software. This means that the cybersecurity of these vehicles must now...

Read More