CRYPTOMATHIC BLOG

 

2 min read

The European Digital Identity Wallet as a Means of Authentication

The European Commission, as part of the eIDAS 2.0 proposal promotes the European Digital Identity Wallet (EUDI Wallet) as an app that enables...

Read More

3 min read

AWS External Key Store (XKS) with the Crypto Service Gateway

AWS Key Management Service (KMS) has long provided cryptographic services to safeguard your AWS resources. This involves generating and managing keys...

Read More

3 min read

Cybersecurity Paradox: How Too Many Solutions Makes You Less Secure

Believing that more cybersecurity solutions increase safety is a common misconception. An overload of security measures can ironically generate more...

Read More

4 min read

Improving Cloud Key Management with the Enclave Security Module

When organizations make the strategic decision to shift their applications and infrastructure onto the cloud, they face a myriad of challenges. These...

Read More
lots of digital pad locks

7 min read

Top 10 Mobile App Security Threats and How to Protect Your Data

The ubiquity of mobile applications has made them part of our day-to-day lives, but with the increased use comes the risk of potential security...

Read More

2 min read

Securing a Software-Defined Future in the Automotive Sector

For decades, cars have been equipped with multiple connected electronic control units (ECUs) that manage various functions like entertainment, route...

Read More

7 min read

WHAT IS AN ELECTRONIC SIGNATURE? HOW DOES IT DIFFER FROM DIGITAL SIGNATURES?

Were I to ask you what a handwritten signature looks like, with an air of confidence will you grab a pen and scrawl your name on a piece of paper,...

Read More

4 min read

Payments from a European Digital Identity (EUDI) Wallet

The European Digital Identity Wallet (EUDI Wallet) is at the forefront of the European Commission's eIDAS initiative to establish a secure and...

Read More
organizations are getting ready for the quantum security era

4 min read

PQC and How Organizations are Preparing for the Quantum Security Era

Quantum computers offer potential transformational power for organizations dealing with complex computational problems in various industries such as...

Read More