Gifting of Digital Cash

4 March 2019

Gifting of digital cash between friends and family members using mobile transaction applications on smartphones have been on the rise in the recent years during festive occasions. Many gifting schemes require may utilize static QR codes as mediums for embedding digital cash value which presents an opportunity for hackers to steal from these QR code enabled digital gift cards.

Learn how enterprise businesses may defend themselves against theft and fraud of digital cash values in QR code enabled gift cards by using secure wallets to protect virtual gifting of digital cash. here.

Learn more about the Wallet Security Module product here.


Crypto-Asset Risks - Part 1

14 September 2018

Read our first part in a series of articles concerning security risks in Cryptocurrencies and Blockchain related assets. This article would aid you in understanding the existing risks in protecting Cryptocurrencies and Blockchain assets you own.

Learn more about possible Crypto-Assets risks here.

Learn more about the Wallet Security Module product here.


ThothTrust creates World’s first Enterprise grade Wallet security solution

19 July 2018

ThothTrust launches the Wallet Security Module for protecting both Cryptocurrency assets and to enable secure mobile payment technologies that leverages tokenization and digital signatures using enterprise security by leveraging the Utimaco HSM.

Read more about the launch of the Wallet Security Module here.

Learn more about the Wallet Security Module product here.


Launch of the ThothTrust Customizable Secure Cryptography service

20 March 2018

The Customizable Secure Cryptography service is now officially launched and available for customers to contact our sales to customize security to their own organisational needs.

The customization service would allow customers to choose from a range of different security levels and customization options to design and create a unique secure environment for customers to execute sensitive cryptographic algorithms and business logic in different environmental conditions ranging from remote offices and outposts to locally hosted datacenters in the customer's environment of choice while ensuring that the level of security for sensitive data remains uninterrupted and consistent.

Learn more about the service here.


Encrypting Credentials

12 January 2018

Read our fourth part in a series of articles concerning credential thefts and leaks and methods to prevent the leaks from being exploited. This article would provide examples and sample code on securing your credentials with strong cryptography.

Access this blog post here.


Protecting Enterprise Data Beyond Perimeter Security

22 September 2017

Read our third part in a series of articles concerning credential thefts and leaks and methods to prevent the leaks from being exploited. This article would bring to light the limitations of Perimeter Security and would begin to introduce how to protect data in-depth.

Access this blog post here.


Impact from credential thefts and leaks

18 August 2017

Read our second part in a series of articles concerning credential thefts and leaks and methods to prevent the leaks from being exploited. More depths on the consequences of credential thefts and leaks would be explored in this article.

Access this blog post here.


How to prevent leaked credentials from being exploited

11 August 2017

Read our first blog post on how to protect your organisation from having your personnel and customer credentials theft and exploitation.

Access this blog post here.


Launch of our Official Blog

11 August 2017

The official ThothTrust Blog has been launched. You may access our blog posts from the side bar on your left.


Launch of our Official Facebook Page

3 August 2017

The official ThothTrust Facebook page has been launched.

Please visit our Facebook page (https://www.facebook.com/ThothTrust-Private-Limited-124301311472160/) for the latest development and information regarding our products, services, news and blogs.


Launch of the Official Media Outlet

20 July 2017

The official ThothTrust media outlet carrying the latest news and product developments for our company have been launched.

Stay tuned for the latest company administrative and product updates via our website or Twitter page (@ThothTrustCom) for more information.


Launching of personal security suite

17 July 2017

A new line of Personal Security suite suitable for protection of sensitive information and to provide a portable secure haven for protecting one's intellectual properties and to allow executing of codes in a secure manner would be planned for our next product launch.

The product will be in the form of a USB Security token bundled come with a software suite to manage the USB Security token.

The Personal Security suite will also feature the ability to securely enter small portions of sensitive information and sensitive secrets (i.e. PIN codes) directly into the device to prevent interception of those sensitive information you do not wish to expose to the host computer.

The image below is a draft of the logo we will be using for our Personal Security product. Can you guess what it is ?


Launch of the SecuriPass product

10 April 2017

The SecuriPass product is now officially available.

Please contact us via the contact form or email us to enquire for more information on the SecuriPass product or to request a demo.