-
3 Questions: Areg Danagoulian on a new arms control tool and the future of nuclear security
Areg Danagoulian, associate professor in the MIT Department of Nuclear Science and Engineering, has built a career around nuclear detection technology. His work has focused, among other things, on a system that could greatly improve the current process for verifying compliance of nuclear warheads. Earlier this year, he published new work on physical cryptographic nuclear…
-
Unveiling Obsidian: The Next-Gen Payment Platform for the Cloud Era
We are delighted to announced the launch of Obsidian, a cutting-edge payment platform designed to meet the evolving needs of the payment industry. The platform offers a robust, cloud-based solution tailored for payment card issuers, wallet providers, and fintech innovators. We are delighted to announced the launch of Obsidian, a cutting-edge payment platform designed to…
-
Choice of app protection approach affects how well protected is an app
The choice of app protection should not be taken lightly. Modern applications face numerous threats that evolve alongside advancements in cybersecurity. To ensure comprehensive security, you must select an approach that aligns with your app’s specific needs and risk profile. The choice of app protection should not be taken lightly. Modern applications face numerous threats…
-
Cryptomathic Innovates in mobile security by extending its MASC solution with an Insights Service -Reaction Engine
Cryptomathic is thrilled to announce a significant enhancement to our Mobile App Security Solution (MASC) offering with Insights Service. Insights Service integrates a brand new and highly performant reaction engine, designed to deliver efficient Runtime Application Self-Protection (RASP) for risk-sensitive mobile applications. Cryptomathic is thrilled to announce a significant enhancement to our Mobile App Security…
-
Cryptomathic and PQShield form strategic alliance to offer PQC solutions for code signing and data protection in compliance with latest NIST and CNSA recommendations
Two foremost software security experts and pioneers in cryptographic agility and post-quantum cryptography join forces to offer comprehensive, quantum-resistant software solution after new PQC standards are released by NIST Two foremost software security experts and pioneers in cryptographic agility and post-quantum cryptography join forces to offer comprehensive, quantum-resistant software solution after new PQC standards are…
-
Quantum-Resistant Short-Lived Certificates
Short-lived certificates play a vital role in current infrastructures, finding a suitable quantum-resistant alternative to the currently used traditional signature schemes is important. This article evaluates the standardized quantum-resistant signature algorithms for this application. Short-lived certificates play a vital role in current infrastructures, finding a suitable quantum-resistant alternative to the currently used traditional signature schemes…
-
Qualified Electronic Signatures – Best Practice Implementation of the Signature Activation Module (SAM)
This article evaluates the implementation options for the Signature Activation Module (SAM) in the context of eIDAS 2. Based on this analysis we recommend placing the SAM inside the Cryptographic Module within the tamper-protected environment provided by the Qualified Signature Creation Device (QSCD). This article evaluates the implementation options for the Signature Activation…
-
The Challenges of Certifying the EUDI Wallet: A Deep Dive
As the European Union solidifies the framework for the EUDI (European Digital Identity) wallet, the certification process outlined in the Implementing Acts has made significant progress. By establishing the certification requirements for the Wallet Secure Cryptographic Device (WSCD) and the Wallet Secure Cryptographic Application (WSCA), the act lays down important steps toward ensuring the security…
-
Assessing the EUDI Wallet Reference Implementation Code
The EUDI wallet reference implementation serves as a practical guide for developers to create secure digital identity management solutions based on the ARF (Architecture Reference Framework). This post delves into the details of the reference implementation code, highlighting mitigation strategies to address its vulnerabilities. The EUDI wallet reference implementation serves as a practical guide for…