Dawn M. Turner (guest)

Dawn M. Turner is a professional author with a passion for technical regulations and standards, as well as for their relevance and impact on corporate operations and industry in general. Dawn has more than 10 years of IT industry experience in hardware, programming & systems & network engineering. Her educational background includes a Certificate in computer operations & programming, CompTIA and Microsoft certifications, including A+, MCSE and MCP, Associates degree with major in business & minor in computer science, Bachelors of Science degree with major in business forensics & minor in accounting and an MBA with concentrations in finance & economics.

3 min read

BYOK: a Solution for EBA’s New ICT and Security Risk Management Guidelines

The European Banking Authority's (EBA’s) new ICT and Security Risk Management Guidelines provide guidance for cybersecurity requirements for...

Read More

5 min read

W3C's suggestion for a Web Cryptography API

The World Wide Web Consortium or W3C as it is commonly known was founded in 1994 by the original architect of the World Wide Web, Tim Berners-Lee. It...

Read More
key blocks

2 min read

PCI Key Block Implementation: Migration Phases & Key Management

In June 2019, the PCI Security Standards Council issued an information supplement titled PCI PIN Security Requirement 18-3 – Key Blocks, which...

Read More

3 min read

SHA-1 is Practical and Cost-Effective to Crack Now

This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.

Read More
Summary of cryptographic algorithms - according to NIST

6 min read

Summary of cryptographic algorithms - according to NIST

A system's cryptographic protection against attacks and malicious penetration is determined by two factors: (1) the strength of the keys and the...

Read More
Key-length

5 min read

Key Types and Crypto-Periods: NIST Key Management Recommendations

This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key...

Read More
eiDAS-onbaording-process

7 min read

Compliant eID Verification & Onboarding for Financial Institutions

This article discusses the benefits eIDs provide for both banks and customers in streamlining cross-border transactions and what is required under...

Read More
What is Banking-Grade Tokenization According to PCI DSS

4 min read

What is Banking-Grade Tokenization According to PCI DSS

The concept of a token has been used in the digital world for almost 50 years to separate and protect real data elements from exposure. In recent...

Read More
third-post.jpg

3 min read

PAdES and Long Term archival (LTA)

Under the eIDAS Regulation, specifications for formatting advanced electronic signatures for PDF documents are set under PAdES. PAdES is the...

Read More