CRYPTOMATHIC BLOG

 

2 min read

NIS2 succeeds NISD, and can now affect you too

Cryptomathic guides you towards compliance. EU Directive 2022/2555 on Network and Information Systems, also known as NIS2, entered into force on Jan...

Read More

1 min read

Secure-by-design key management for risk remediation against Storm-0558 type attacks

Over the course of a month in May/June 2023, hundreds of thousands of emails belonging to Microsoft customers were exposed to a hacker labelled...

Read More

4 min read

Steps to Achieve State-of-the-Art Protection for Your Mobile Apps

In today's digital landscape, ensuring the security of your mobile applications is paramount. Cryptomathic's Mobile App Security Core (MASC) is at...

Read More

2 min read

(re)Introducing Cryptomathic

A note from Laurent Lafargue, Global CEO If you’re reading this, you may have noticed a new look to the Cryptomathic website today! We’re very...

Read More

2 min read

Mobile Point of Sale Compliance – What is it all about?

PCI have recently released the new standard and compliance program for Mobile Payments on Commercial off-the-shelf devices (MPoC). This blog is the...

Read More

2 min read

eIDAS 2.0 – What’s New?

The European eIDAS regulation, short for the Electronic IDentification, Authentication and Trust Services Regulation, was created in 2014 to ensure...

Read More

2 min read

Demystifying Mobile Application Hardening: Techniques and Best Practices

What is Mobile Application Hardening? Mobile application hardening refers to the process of securing mobile applications against various threats and...

Read More

2 min read

More Post-Quantum Digital Signature Candidates!

On July 17, 2023, the National Institute of Standards and Technology (NIST) announced a new set of 40 candidates to compete in their Post-Quantum...

Read More
High rise buildings- banking

3 min read

Cloud Data Security: Why Centralized Key Management is Vital for Banks

In today's digital era, banks are increasingly leveraging cloud and multi-cloud environments to drive operational efficiency. However, the security...

Read More