CRYPTOMATHIC BLOG

 

Key Management

Secure Your Data in Azure with External Key Management and BYOK

1 min read

Secure Your Data in Azure with External Key Management and BYOK

Data security can be complex, but it's essential in today's business world, especially when using cloud services. One effective approach is adopting...

Read More
Key Management for Hosted Hardware Security Modules and PQC

2 min read

Key Management for Hosted Hardware Security Modules and Post-Quantum ready Cryptography

In today's fast-evolving digital landscape, robust key management has become an essential part of securing sensitive data and communications. The...

Read More

4 min read

Key Management in the Automotive Domain

Today’s cars are computers on wheels which operate in a connected world and ecosystem of other cars, roadside infrastructure, and the cloud. Car...

Read More

7 min read

Exploring DORA

Cryptomathic solutions support your financial institution towards compliance. The financial sector is increasingly dependent on technology and on...

Read More

2 min read

NIS2 succeeds NISD, and can now affect you too

Cryptomathic guides you towards compliance. EU Directive 2022/2555 on Network and Information Systems, also known as NIS2, entered into force on Jan...

Read More

1 min read

Secure-by-design key management for risk remediation against Storm-0558 type attacks

Over the course of a month in May/June 2023, hundreds of thousands of emails belonging to Microsoft customers were exposed to a hacker labelled...

Read More
High rise buildings- banking

3 min read

Cloud Data Security: Why Centralized Key Management is Vital for Banks

In today's digital era, banks are increasingly leveraging cloud and multi-cloud environments to drive operational efficiency. However, the security...

Read More

2 min read

Securing a Software-Defined Future in the Automotive Sector

For decades, cars have been equipped with multiple connected electronic control units (ECUs) that manage various functions like entertainment, route...

Read More

5 min read

Encryption for GDPR Compliance

Under the GDPR, organizations must take appropriate measures to protect personal data from unauthorized access, use, disclosure, or destruction. One...

Read More