CRYPTOMATHIC BLOG

 

2 min read

4 Reasons How Banks Should Use Cryptography To Become Digitally Agile

For traditional banks to rise above the competition they face from big tech, neobanks, and fintech, they need to add new digital skills to their...

Read More
e-Health-in-the-Cloud-eIDAS-Cryptomathic

3 min read

eIDAS and the eHealth Governance Initiative

The healthcare market in Europe is valued at more than USD 2 trillion and is projected to increase due to the aging population not just in the EU but...

Read More
eIDAS-printout-banner

2 min read

The eIDAS-compliant Printout of a Digitally Signed Document

This article describes a model that could enable an electronically signed document to be printed out and used as an original in legal proceedings, in...

Read More
Secure Hardening for Mobile Banking Apps: Data Obfuscation

3 min read

Secure Hardening for Mobile Banking Apps: Data Obfuscation

When developing an application for mobile banking, application hardening using code obfuscation is one possible way of protecting sensitive data....

Read More
The Union Jack atop a flagpole seen against a blue sky with fluffy white clouds

5 min read

Qualified Digital Signing and Electronic Signature UK Law

This article aims to demystify electronic signature UK law and explain how it supports all types of electronic transactions in accordance with UK...

Read More
Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

5 min read

Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...

Read More
eIDAS: How Greater Interoperability Enables Business Cooperation

2 min read

eIDAS: How Greater Interoperability Enables Business Cooperation

eIDAS will not only usher in a new era of innovation and transparency in how organizations do business, but this regulation is also paving the way...

Read More
PSD2-eIDAS-Distributed-Authentication

8 min read

The PSD2 - Directive and Distributed Authentication

PSD2 breaks up the ways in which banks do their business, by forcing them to open up their APIs. By doing so, PSD2 challenges the way in which data...

Read More
Crypto-Agility: The Real Gold (Standard) at the End of the Rainbow

3 min read

Crypto-agility: The Gold at the End of the Rainbow for NIST PQC

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...

Read More