EMV Personalization cryptographic requirements 

How Cryptomathic’s AWS BYOK Service Provides Secure Scalability, Durability, and Availability

Cryptomathic’s AWS BYOK Service for Enhanced Auditability in The Cloud

Secure BYOK for AWS Simple Storage Services (S3)

Accenture's Insights on Crypto-Agility

How Prepared are Companies for Quantum Computing Cybersecurity Risk?

New Executive Order on U.S. Surveillance Might Lead to "Schrems III"

How Cryptomathic’s AWS BYOK Service Provides Expanded Security

Secure AWS BYOK Service for DynamoDB

Hosting on AWS as a European Company - What about Data Residency, Regionality, Digital Sovereignty and GDPR Compliance?

Secure BYOK Service for AWS Applications

eSigning High-Value Documents - Prioritizing Security In The Digital Era

EMV Payment Security - Acquirers

Digital Signatures vs Wet Signing: The Implications Of Alleged Forged Signatures During The Home Buying Process

Agile Cryptography for Turnaround Business Models of Retail Banks

Schrems II puts the brakes on AWS cloud adoption for Denmark’s education and pension services

Beyond the Video-Ident Hack: Securely Sign with a Smile

EMV Payment Security - Merchants

EMV Payment Security - Issuers

A Brief Overview of the Challenges Involved in Key Management for EMV Personalization: The Main Actors of EMV Personalization

Secure Connectivity for Mobile Banking and Payment Apps: Strong Authentication

Tokenization and Securing Mobile Payments Apps

The UK Conveyancing Association Lenders Survey Reveals the Need for eIDAS Qualified Electronic Signatures

NIST Post-Quantum Cryptography Standardization: SIKE Bites the Dust

What You See Is What You Timestamp – A cost-effective acceptance method to guarantee non-repudiation document acceptance for legal archiving purposes

Which Industry Sectors MUST Use Electronic Signatures?

How to Convert Key Blocks

Good key management for financial services: protecting your digital assets from the inside out

The NIST Announcement on Quantum-Resistant Cryptography Standards is Out. Act Now!

EMV Payment Security - Cardholders

Qualified Digital Signing: The Electronic Execution of Documents in England & Wales

Crypto-Agility: The gold at the end of the Rainbow for NIST PQC Standardization

eIDAS Qualified Remote Signing Technology – Different Integration Options

An Overview of the Different Key Block Formats

Remote Signing Services for Banks, TSPs and Industrial Customers - An Overview

Explaining the Java ECDSA Critical Vulnerability

Qualified Electronic Signing for Digital Mortgage Disruption and why a Wet Signature is ‘so last year’ 

Summary of the Practical Key Management Challenges Behind Symmetric Cryptography in Financial Institutions 

NIST PQC Finalists Update: It’s Over For The Rainbow

UK eIDAS & EU eIDAS - What Does This Mean for Cross-Border Transactions and Digital Signatures?

Crypto-Agility in the Advent of Post Quantum Computing

Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

When Will Quantum Computing Arrive and How Will It Impact Cybersecurity?

Manage, Handle and Control Your Own Key in the MS Azure Key Vault

Payment & Banking Cryptography: An Overview of the Benefits of z/OS and the Z Platform

TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

Common Key Management System Models for the Cloud

Understanding the Concepts of Bring Your Own Key

PCI PIN Requirements for Key Blocks in the Payment Card Industry - FAQs

Introduction to Cryptographic Key Blocks - FAQs

Hybrid Cloud & Key Management for Financial Service Platforms: IBM's New CCA 7.0 and the Mainframe z15

How Cryptomathic Signer differs from other eIDAS compliant remote signing solutions

Benefits of eIDAS Qualified Signature Creation Devices and Why Cryptomathic Signer has the Strongest Security Credentials

ANSI X9.24-1-2017: Key Replacement, Destruction, and Archiving

All Trains Cancelled: How an e-Signature Failure Derailed a €3bn Swiss-Austrian Transport Deal

International Trade – Building Trust with eIDAS (Part 1 of 2)

Customer Demand Helps to Co-Shape Banking Security and Cryptography Architecture

Payment & Banking: Why IBM z/OS Needs a Banking-grade KMS for the Hybrid Cloud

eIDAS-compliant eSignatures: Business Continuity in Times of COVID and Beyond

eIDAS and the Globalisation of Trust

Retail Banking after COVID: How Agile Cryptography Streamlines Self-Disruption

Cryptomathic CKMS: Centralized & Automated Key Management for payShield HSMs

Selecting the Right Key Management System

Attacks on PDF Certification and the impact on Approval Signatures

BYOK for MS Azure KEY Vault - Helping Banks Take Control of Their Keys for MS Azure, Dynamics, and Office 365

Cryptomathic Signer Supports Multi-Tenancy, Multi-Policy and Multi-IdP for Global Signature Services

Air India's Massive Data Breach - following best practices for data security is more important than ever

Payment Security and Key Blocks: Why are key blocks so secure?

eIDAS - What You See is What You Sign (WYSIWYS) for Non-Repudiation

Cryptomathic Integrates with CyberArk to Enable HSM-as-a-Service in Tier-One German Bank

Payment Security: Thales Key Blocks and how They are Used in payShield HSMs

eSignatures and eIdentification – Transforming Digital Business

Cardholder, Merchant, Issuer & Acquirer - The Four Corners Model for Payment Security and Key Management

Signing the way to eIDAS Compliance

Banking and Finance Amid Lockdowns – How eIDAS e-signatures are helping to keep it going

Misuse of X.509 Certificates & Keys Involved in SolarWinds Attack

End-to-end Banking-grade Key Management - From On-premise to Multi-cloud BYOK

Bring Your Own Key (BYOK) to AWS Enlarges Scope of Manoeuvre for Financial Institutions

RSA is not destroyed, but do remain vigilant and be crypto-agile!

The SolarWinds attack and best practices for code-signing

Bring Your Own Key (BYOK) to the Google Cloud Brings New Opportunities to Financial Institutions

Plugging the Security Gaps in Mobile Banking Apps

Migrating Business-Critical Cryptography to the Cloud - Considerations for the Banking Sector

Key Management: New Digital Models for Banks and New Security Models, Too

Cryptomathic Signer’s QSCD is Certified Based on the Common Criteria Recognition Arrangement

eIDAS and PSD2 – A perfect symphony in the digital marketplace?

Turning Cryptography into a Service - Part 2

ANSI X9.24-1-2017:  Key Compromise

Retail Banking - A Stacked Platform Future with Next Generation Security

Understanding the Certificate Authority in the Context of eIDAS

BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

An Overview of EBA's New Guidelines on ICT and Security Risk Management (EBA/GL/2019/04) in the Light of COVID-19

Banking-Grade BYOK for Office 365

Digital signature deployment models for banking - Operating as an eIDAS Compliant Registration Authority Reduces Costs and Preserves Customer Ownership

Three Deployment Versions & Business Models of eIDAS-compliant Remote Signing for Financial Institutions

Cryptomathic’s Signer Builds on the Only QSCD Certified under SOG-IS

Why a Key Management System Must Understand ANSI X9.24 / TR-31 Key Blocks

eIDAS-Qualified Remote Signing: Exploring EN 419 241-2 Certified Qualified Signature Creation Devices 

IBM's z15 Mainframe - Security, Resilience and Secure Key Management for Financial Service Platforms

Building Security Systems for the Internet of Things and Crypto Agility

BYOK: a Solution for EBA’s New ICT and Security Risk Management Guidelines

Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

eIDAS  - Electronic Signing for Professional Service Providers (Notaries, accountants, insurance agents, consultants)

eIDAS - Enabling Banking Without Borders

Open Banking - Success through Agile Alignment of Security Infrastructure, Strategy and Technology

How eIDAS can help SMEs grow and prosper

A Three-pronged Approach to Increasing eIDAS Trust Services Uptake

Achieving Agile Cryptography Management with Crypto Service Gateway (CSG)

What Do Companies Perceive as the Most Important Encryption Features?

ANSI X9.24-1-2017: Key Utilization and Storage

The Digital Trade Initiative - Introduction

Payment & Banking: An Introduction to z/OS and the IBM Common Cryptographic Architecture

eIDAS  - Remote Electronic Signatures for Banks - Harnessing the Savings Potential (part 2) 

Leading the Digital Change, Part 2 – Turning eIDs into universal tools

Understanding the IBM CCA key format and the importance of banking-grade key management

The Postbank Master Key Breach in South Africa: Using Strong Key Management in a Banking Environment is a Necessity

Key Management: Cloudy with a Probability of Breach

eIDAS - Remote Electronic Signatures for Banks - Harnessing the Savings Potential (part 1)

Banks, Ecosystems & Service Innovation - Aligning the Crypto Architecture around MS Azure and Dynamics

eIDAS - Establishing Trust in Digital Signatures

Why a Banking Key Management System Must Support Atalla Key Blocks

Common Types of Cryptographic Keys That are Most Difficult to Manage

Secure Hardening for Mobile Banking Apps: Native Code Obfuscation

Resolving Common Pain Points of Key Management

Banks Need to be Digitally Agile and Cryptography Should be the Enabler

Secure Hardening for Mobile Banking Apps: Data Obfuscation

Q&A on Quantum Computing and Cryptography: The Risks Posed and how Crypto-Agility can Help Prepare for it

Examining the Impact of eIDAS - Part 1

Securing the Life-cycle of a Cryptographic Key

Integrating Microsoft’s Banking Accelerator (MS Dynamics) in the Cloud with On-Premise Banking-Grade Key Management

High-Security Cryptographic Key Management for the Hybrid-Cloud User

Secure Hardening for Mobile Banking and Payment Apps: Anti-Debug

Managing Keys for ATM Remote Key Loading using CKMS

Taking Stock – How is eIDAS stacking up for SMEs? (Part 2)

Secure Connectivity for Mobile Banking and Payment Apps: HTTPS Vulnerabilities

Taking Stock – How is eIDAS stacking up for SMEs? (Part 1)

ANSI X9.24-1-2017: Key Distribution 

ANSI X9.24-1-2017: Key Loading

Secure Connectivity for Mobile Banking and Payment Apps: HTTPS Tunneling

Secure Connectivity for Mobile Banking and Payment Apps: Access Token Protection

Achieving Software Integrity Through Centralized Code Signing

Overview of App & Code Hardening for Mobile Banking Apps

Secure Storage and Key Protection for Mobile Banking and Payment Apps

ANSI X9.24-1-2017: Understanding Symmetric Key Creation and Key Component & Key Share Creation

ANSI X9.24-1-2017 & ISO 13491-1: An Introduction to Secure Cryptographic Devices Used in a Retail Financial Services Environment

Mobile Banking and Payment App Hardening: Anti-Tamper

ANSI X9.24-1-2017: An Introduction into Key Blocks

The future of eIDAS in Britain

PCI Requirements on Implementing Key Blocks - Migration Phases and Key Management Solutions

Steps to reach crypto agility to get prepared for quantum computing

App Hardening for Mobile Banking and Payment Apps: Emulator Detection

The SHA-1 Attack Further Emphasizes the Need for Crypto-Agility 

SHA-1 is Practical and Cost-Effective to Crack Now

ANSI X9.24-1-2017: The General Key Management Requirements

Application Hardening for Mobile Banking Apps: Root and Jailbreak Detection

Exploring the synergy between eIDAS and the new European Interoperability Framework

Understanding The New FIPS 140-3

Protecting Banking Apps Against Malware Threats

General Concepts of Application Hardening for Mobile Banking Apps

Understanding PCI PTS HSM

ANSI X9.24-1-2017: Understanding the Card Payment Environment and the use of Symmetric Keys

Overview of Defense Mechanisms for Mobile Banking Apps

An Introduction into ANSI X9.24-1-2017 part 1

How Tokenization May Reduce False Declines

Summary of cryptographic algorithms - according to NIST

Examining the Impact of eIDAS - Part 2

The link between HSMs and a Centralized Key Management System

Overview of NIST Key Management Recommendations on Key Types and Crypto-Periods

How eIDAS is Levelling the Playing Field for Small Businesses

NIST & FIPS Considerations for EMV Tokenization

How to Reduce Cryptography-Risks related to PCI DSS

EBA’s opinion on elements of Strong Customer Authentication under PSD2 – Part 2 – Possession and Knowledge

EBA’s Opinion on elements of Strong Customer Authentication under PSD2 – Part I - Inherence

Cryptomathic Launches Mobile Solution for Digital Onboarding at the Branch - Supported by QES

eIDAS Electronic Signatures: Qualified vs Advanced - When to choose what and why

eID Verification Process and Client Onboarding for Banks and Financial Institutions compliant to eIDAS, KYC and AML

Some of the Technologies Behind Tokenization for Card Transactions and PCI-DSS

Federated Signing for Online Customer Onboarding

Tokenization in Banking and Financial Services

The Challenges and advantages of EMV Tokenization

Key Meta-Data: Why It’s Important and How to Manage It

A Brief Analysis of the Market and Stakeholders for eIDAS Enabled Solutions

What is Banking-Grade Tokenization According to PCI DSS

European Citizen’s Initiative – How eIDAS is Enabling Participative Democracy in the EU

Integrating PSD2 and eIDAS

Centralized Key Management Systems: Challenges and Opportunities for the Next Decade

The Need for a Crypto Abstraction Layer: Utilizing HSMs with Greater Efficiency and Agility

Which Trust Service Providers Support Remote QES Services?

eIDAS: How Greater Interoperability Enables Business Cooperation

Cryptographic Key Management Concepts: on Key Generation, Metadata, Life-cycles, Compromise and more

What are E-Signature Validation Attacks and How to Protect Yourself in the Context of eIDAS

Enterprise-grade code signing: Securing the Signing Process

Symmetric Cryptography and Key Management: Considerations on Key Exhaustion, Rotation and Security Models

The Role of Random Number Generators in Relation to HSMs & Key Management

eIDAS and Trusting the Internet of Things

Connecting Europe - eInvoicing and eIDAS

The need to manage both symmetric and asymmetric keys

Whitfield Diffie: the well-deserved laureate of the 2015 Turing Award

eIDAS and the eSignature Standards Driving Digitization in the EU