5 min read
Technologies Behind Tokenization For Card Payments And PCI-DSS
The EMV consortium released several standards detailing how “network” tokenization should be handled. There is now a general consensus within the...
 
                  
                
                5 min read
 Martin Rupp (guest):  12. August 2019
                    
                    Martin Rupp (guest):  12. August 2019
                  The EMV consortium released several standards detailing how “network” tokenization should be handled. There is now a general consensus within the...
 
                  
                
                6 min read
 Martin Rupp (guest):  18. July 2019
                    
                    Martin Rupp (guest):  18. July 2019
                  EMV is short for EUROPAY-VISA-MASTERCARD. This term is used to refer to standards that have been designed to improve the security of credit and debit...
 
                  
                
                2 min read
This article explains the concept of meta-data in the context of cryptographic keys, explaining why it is used and the necessity to manage it well.
 
                  
                
                4 min read
The concept of a token has been used in the digital world for almost 50 years to separate and protect real data elements from exposure. In recent...
 
                  
                
                4 min read
In many parts of the world, including the European Union and the United States, businesses have adopted digital signing as a way to implement...
 
                  
                
                4 min read
The following content is an introduction to trust services and remote Qualified Electronic Signatures (QES) according to the eIDAS regulation and...
 
                  
                
                3 min read
The Payment Card Industry Data Security Standard (PCI DSS) is a security standard for information that protects against credit card fraud and many...
 
                  
                
                5 min read
This article looks at the concept of cryptographic key management – what it is, why it’s important, and how an electronic key management system...
 
                  
                
                5 min read
Preserving the integrity of an e-signature is crucial to protecting the attached messages or documents. In this article, we delve deeper into the...