Steps to reach crypto agility to get prepared for quantum computing

As the scientific community continues to push towards achieving quantum computing on a mass scale, smart companies are busy making preparations for this inevitability. While scientists disagree on whether its 5 years away or 20 (or more), the reality is that the amount of time that organizations have to prepare is quickly slipping away. These preparations go far beyond just planning for new infrastructure investments. This is especially true when it comes to the use of cryptography and crypto keys. Whether you are just beginning to plan for the quantum future or are well down the path, here are three important steps that will help you achieve crypto-agility and prepare yourself for quantum computing.

Read more

International Trade – Building Trust with eIDAS (Part 2 of 2)

We looked at how eIDAS has the potential to enhance trust and thus reduce costs when it comes to international trade transactions in our previous article. This article continues on a similar theme, exploring the role that something like eIDAS can play in the digitalization of global trade, and also in the trade of digital goods.

Read more

International Trade – Building Trust with eIDAS (Part 1 of 2)

International trade is based on the concept of trust. In situations where there isn’t some established trust, the trading parties get their respective banks involved and use various trade finance products like Letters of Credit to ensure that both sides adhere to the terms of the trade as laid out in the contract. It is this trust that fuels global trade and countries where it can be strengthened, generally tend to become the preferred trading partners over time. It is this focus on trust in international trade that brings us to the topic of this two-part series. This article focuses on how eIDAS can help establish trust between trading partners not just across the EU but around the world.

Read more

Achieving Agile Cryptography Management with Crypto Service Gateway (CSG)

CSG helps you realize business-agile and efficient crypto services, with central control of security policy and crypto hardware. In this article, we will look at some of the uses cases that address common crypto headaches whilst generating a strong return on investment.

Read more

Symmetric Key Encryption - why, where and how it’s used in banking

In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data that can expose the personal identifying information (PII) or payment card details of customers and clients. Encryption is crucial for protecting PII and mitigating the risks that businesses which conduct payment transactions face every minute of every day.

In this article we will talk about symmetric encryption in banking, its advantages and some challenges of managing the keys.

Read more

Selecting the right Key Management System

The protection and secure management of cryptographic keys is crucial for ensuring that cryptography is used in the most effective way to keep data secure. Picking the wrong key management system (KMS) can thwart all the efforts that have been made in using cryptography to protect information.

Read more

What is Quantum Computing and how does it relate to today’s Cryptography Infrastructure Investments

The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating infrastructure expansion and upgrades. Quantum computing is still being developed but gets closer to reality every day. Here we look at the high level impacts of quantum computing in relation to cryptographic infrastructure.

Read more

Cryptomathic adds XML signing to its WYSIWYS Solution

With support for signing XML documents in its WYSIWYS solution, Cryptomathic now provides the means to offer the much desired What You See Is What You Sign (WYSIWYS) feature for both PDF documents and XML files. With WYSIWYS, it is possible to demonstrate that signatory’s intent was provided for, with a well-specified UI, thereby strengthening non-repudiation of online transfers or other signature operations. The new feature is now available as part of the latest Cryptomathic Signer product version, released in November 2018.

Read more

5 ways eIDAS is Boosting the Digitization of Trade

Retail banking has been unrecognizably transformed by digitization. Everything from payments to basic credit products can now be availed digitally. However, when it comes to corporate or business banking, the pace has just not been the same. One good example of this is the process of trade which includes both vanilla open account transactions and trades secured via documentary credit products.

Read more