CRYPTOMATHIC BLOG

 

your-own.key-Cryptomathic-infosec-key-management

2 min read

Key Management – A Question of Ownership

This article looks at the problems associated with key management that are common in many businesses today, where there is no clear ownership; then...

Read More

3 min read

Mobile App Hardening: Root and Jailbreak Detection

Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...

Read More
ANSI X9.24-1-2017:  Key Compromise

2 min read

ANSI X9.24-1-2017:  Key Compromise

In a retail financial services environment, the compromise of a symmetric cryptographic key is a critical security breach. Such a situation is...

Read More
What is Quantum Computing and how does it relate to today’s Cryptography Infrastructure Investments

3 min read

Quantum Computing and Cryptography Infrastructure Investments

The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...

Read More

3 min read

Retail Banking - A Stacked Platform Future with Next Generation Security

Consumer behavior have shown a dramatic shift toward a preference for seamless digital banking solutions. Many banking customers now want simple and...

Read More

3 min read

Recommendations for Providing Digital Signature Services

With the ever-growing number of electronic transactions and documents, the use of digital signatures make it possible to trust and act upon these...

Read More

4 min read

Understanding the Certificate Authority in the Context of eIDAS

In this article, we will discuss the Certificate Authority (CA) in the context of eIDAS and what is required of this entity in ensuring the integrity...

Read More
An Overview of EBA's New Guidelines on ICT and Security Risk Management (EBA/GL/2019/04) in the Light of COVID-19

5 min read

Exploring the EBA's New ICT and Security Risk Management Guidelines

Considering the COVID-19 impact on digitalization, EBA’s updated Guidelines on ICT and Security Risk Assessment will help focus on priority areas,...

Read More
Banking-Grade BYOK for Office 365

3 min read

Banking-Grade BYOK for Office 365

Securing data and keeping it private is essential for many organizations and institutions, including banks or ministries, where data security and...

Read More