Skip to the main content.

CRYPTOMATHIC BLOG

 

IBM's z15 Mainframe - Security, Resilience and Secure Key Management for Financial Service Platforms

3 min read

IBM z15 Mainframe: Key Management & Resilience

Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...

Read More
Tokenization-will-reduce-false-declines

4 min read

How Tokenization Reduces Payment False Declines

This article discusses how tokenization may reduce false declines with credit card transactions that could negatively impact merchants.

Read More

3 min read

Crypto-Abstraction Layer: What You Need to Know

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...

Read More
Introduction to Cryptographic Key Blocks - FAQs

2 min read

FAQs on Cryptographic Key Blocks and Their Use

This article proposes answers to a series of frequently asked questions (FAQs) about key blocks.

Read More
commoncriteria_logo

3 min read

How Common Criteria Helps Organizations Choose the Right HSM

Hardware Security Modules (HSMs) are used in all card payment systems (as well as various other applications that require strong security) to protect...

Read More
How Cryptomathic Signer differs from other eIDAS compliant remote signing solutions

3 min read

Cryptomathic Signer: Advanced eIDAS-Compliant Signing

As part of the global drive for digital transformation, legally binding digital signatures are at the forefront of many businesses’ ambitions to...

Read More

5 min read

How an e-Signature Failure Derailed a €3bn Swiss-Austrian Deal

Last week order for 186 double-decker trains was nullified due to a legal formality surrounding the Qualified Electronic Signature used to ink the...

Read More
Methods_of_maximizing_the_security_protection_of_a_cryptographic_system.jpg

5 min read

Maximizing PCI & Cryptographic System Security

This article talks about how different factors and controls can affect the strength and effectiveness of a cryptographic system's security. It gives...

Read More

3 min read

How FinTechs can benefit from the European eIDAS Regulation

The financial service industry has always been innovator in technology adoption. This is not surprising considering the nature of the industry with...

Read More