CRYPTOMATHIC BLOG

 

How Prepared are Companies for Quantum Computing Cybersecurity Risk?

3 min read

How Prepared are Companies for Quantum Computing Cybersecurity Risk?

This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current...

Read More
Protecting-banking-apps-against-malware-cryptomatic

5 min read

Protecting Banking Apps Against Malware Threats

Here we explain why additional security mechanisms, beyond the mobile OS security features, are needed to protect mobile banking applications from...

Read More
New Executive Order on U.S. Surveillance Might Lead to

3 min read

New Executive Order on U.S. Surveillance Might Lead to "Schrems III"

In this article we will discuss why shortfalls in U.S. President Joe Biden’s recent Executive Order do not meet the requirements of the EU’s Charter...

Read More
How Cryptomathic’s BYOK-as-a-Service for AWS Provides Expanded Security

2 min read

How Cryptomathic’s AWS BYOK Service Provides Expanded Security

This article discusses how Cryptomathic’s AWS BYOK Service delivers expanded security to protect cryptographic keys while using AWS cloud...

Read More

5 min read

Customer Behaviour Drives Banking Security And Cryptography Architecture

Changing customer behaviour and expectations are driving the transformation of the new banking security architecture. While customers want more...

Read More
overview-technologies-protect-banking-cryptomathic

3 min read

Overview of Defense Mechanisms for Mobile Banking Apps

As the use of mobile phones for mobile banking and payment applications increases, corresponding security threats are increasing as well. The...

Read More
Secure AWS BYOK Service for DynamoDB

2 min read

Secure AWS BYOK Service for DynamoDB

In this article we will explain what AWS DynamoDB does and how Cryptomathic's AWS BYOK Service is an option for providing secure key management as a...

Read More
TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

4 min read

TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated. The TR-34 norm is an implementation of the...

Read More
Hosting on AWS as a European Company - What about Data Residency, Regionality, Digital Sovereignty and GDPR Compliance?

3 min read

EU AWS Hosting: Data Residency, Regionality, Digital Sovereignty, GDPR

This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.

Read More