3 min read
Key Management Challenges in Financial Symmetric Cryptography Systems
This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
3 min read
This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...
2 min read
The eIDAS Regulation (No 910/2014) (EU eIDAS) came into force in 2016. It created a Europe-wide legal framework for electronic identification,...
5 min read
There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...
2 min read
Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...
2 min read
Maybe you have wondered where our logo comes from and what it actually means. If you have, we hope the following will answer these questions. Just as...
2 min read
The European Union is leading the way in the move towards the creation of a single digital market. There are many advantages a digital business has...
6 min read
With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...
2 min read
Microsoft’s Azure Key Vault Managed HSM allows customers to safeguard their cryptographic keys for their cloud applications and be...
3 min read
This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for...