Blog
Generic Identity Device Specification (GIDS) for Smart Card Authentication
GIDS sets out the functionality of a physical identity device that can be used for authentication, such as a smart card or USB token.
Qu’est-ce que le PKCS#11 ?
PKCS#11 définit une API pour communiquer avec des jetons de sécurité cryptographiques ("tokens cryptographiques") tels que les cartes à puce, les clés USB et les modules de sécurité matérielle (HSM). Également connu sous le nom de "Cryptoki", PKCS#11 fait partie des normes de cryptographie à clé publique
Introducing Our New Partner, Korum Secure
Microcosm is pleased to announce that Korum Secure is our new distributor in France.
Dinkey Pro/FD Version 7.4 Released
We are very pleased to announce a new release of the Dinkey Pro/FD SDK, version 7.4. Version 7.4 brings a much sought-after feature to Dinkey Pro/FD—demo software keys. Read on to learn more.
Google Advanced Protection Program
Google have introduced their strongest security for personal Google accounts. Support for hardware Security Keys now offers the strongest form of account protection against sophisticated phishing attacks.
HOTP et TOTP : quelle est la différence ?
HOTP et TOTP sont les deux principaux protocoles permettant de créer des mots de passe utilisables une seule fois, mais quelles sont leurs implications du point de vue de la sécurité, et lequel choisir ?
Microcosm is Now Listed on WiredGov
Microcosm is pleased to announce that it is now listed on WiredGov, enabling the distribution of our digital security software and hardware to the UK government and public sector organisations.
Cybersecurity Budgets
Driven by ever-increasing rates of cyber crime, spending on cybersecurity is expected to rise by 12-15% over the next five years, with cumulative global spending predicted to exceed $1 trillion from 2017 to 2021.
Dinkey Pro/FD Version 7.3 Released
We are very pleased to announce a new release of the Dinkey Pro/FD SDK, version 7.3. Read on to learn more about what's new in version 7.3 and how it can benefit you.
Why Passwords are Failing to Keep Systems Secure
When designing a system, using passwords to protect access might be the first thing you think of. However, this is rarely enough to secure sensitive information.