Blog
Generic Identity Device Specification (GIDS) for Smart Card Authentication
GIDS sets out the functionality of a physical identity device that can be used for authentication, such as a smart card or USB token.
¿Qué es PKCS#11?
PKCS#11 define una API para la comunicación con tokens con seguridad criptográfica como tarjetas inteligentes, llaves USB y módulos de seguridad de hardware (HSMs). También conocida como Cryptoki", PKCS#11 es parte de las Public Key Cryptography Standards.
Introducing Our New Partner, Korum Secure
Microcosm is pleased to announce that Korum Secure is our new distributor in France.
Dinkey Pro/FD Version 7.4 Released
We are very pleased to announce a new release of the Dinkey Pro/FD SDK, version 7.4. Version 7.4 brings a much sought-after feature to Dinkey Pro/FD—demo software keys. Read on to learn more.
Google Advanced Protection Program
Google have introduced their strongest security for personal Google accounts. Support for hardware Security Keys now offers the strongest form of account protection against sophisticated phishing attacks.
HOTP frente a TOTP: ¿En qué se diferencian?
HOTP y TOTP constituyen los dos patrones principales de las contraseñas de un solo uso, pero ¿qué significan desde el punto de vista de la seguridad y por qué elegiría una y no otra?
Microcosm is Now Listed on WiredGov
Microcosm is pleased to announce that it is now listed on WiredGov, enabling the distribution of our digital security software and hardware to the UK government and public sector organisations.
Cybersecurity Budgets
Driven by ever-increasing rates of cyber crime, spending on cybersecurity is expected to rise by 12-15% over the next five years, with cumulative global spending predicted to exceed $1 trillion from 2017 to 2021.
Dinkey Pro/FD Version 7.3 Released
We are very pleased to announce a new release of the Dinkey Pro/FD SDK, version 7.3. Read on to learn more about what's new in version 7.3 and how it can benefit you.
Why Passwords are Failing to Keep Systems Secure
When designing a system, using passwords to protect access might be the first thing you think of. However, this is rarely enough to secure sensitive information.