Selecting the right Key Management System

The protection and secure management of cryptographic keys is crucial for ensuring that cryptography is used in the most effective way to keep data secure. Picking the wrong key management system (KMS) can thwart all the efforts that have been made in using cryptography to protect information.

Read more

What is Quantum Computing and how does it relate to today’s Cryptography Infrastructure Investments

The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating infrastructure expansion and upgrades. Quantum computing is still being developed but gets closer to reality every day. Here we look at the high level impacts of quantum computing in relation to cryptographic infrastructure.

Read more

Cryptomathic adds XML signing to its WYSIWYS Solution

With support for signing XML documents in its WYSIWYS solution, Cryptomathic now provides the means to offer the much desired What You See Is What You Sign (WYSIWYS) feature for both PDF documents and XML files. With WYSIWYS, it is possible to demonstrate that signatory’s intent was provided for, with a well-specified UI, thereby strengthening non-repudiation of online transfers or other signature operations. The new feature is now available as part of the latest Cryptomathic Signer product version, released in November 2018.

Read more

5 ways eIDAS is Boosting the Digitization of Trade

Retail banking has been unrecognizably transformed by digitization. Everything from payments to basic credit products can now be availed digitally. However, when it comes to corporate or business banking, the pace has just not been the same. One good example of this is the process of trade which includes both vanilla open account transactions and trades secured via documentary credit products.

Read more

The new ETSI standard for eIDAS qualified certificates supporting the PSD2 directive

In November 2018, ETSI published the new version of standard ETSI TS 119 495 - Sector Specific Requirements Qualified Certificate Profiles and TSP Policy Requirements under the Payment Services Directive (EU) 2015/2366. The standard was expected by financial institutions and trust services to allow secure communication in the context of Payment Service Directive 2 (PSD2).

Read more

A Three-pronged Approach to Increasing eIDAS Trust Services Uptake

The last few months have been exciting for all stakeholders involved in the implementation and use of the eIDAS toolbox. Some important milestones have been reached and new initiatives are taking off. However, to really increase the uptake of eIDAS enabled services, a three-pronged approach is needed to really bolster the main growth drivers. This approach is based on the feedback received from the various respondents in a recent ENISA survey and its accompanying report.  

Read more

The Advantages of Automated Key Management

The use of cryptography is the foundation for secure processing of financial and other electronic transactions. The management of the associated cryptographic keys, on the other hand, has been equally effective at stressing the capabilities of your people, processes, and systems. With that in mind, here are three advantages that automated key management will give you and your organization.

Read more

eIDAS Trust Services – Strengths and Challenges in Implementation

A study published in early 2018 by the European Union Agency for Network and Information Security (ENISA), revealed that 90% of the respondents believed eIDAS to be an opportunity to grow their business. It is no wonder then that recent adoption of the eIDAS framework has been gathering steam. However, there are still a number of barriers that exist when it comes to the implementation and uptake of Trust Services as defined in the eIDAS regulation. Here, we look at some of those barriers along with some key strengths of the trust services market.

Read more

Distributed vs Centralized Key Management

The need for mitigating risk with an appropriate key management system (KMS) is critical to the success of any organization that shares sensitive data across networks.

Here is a breakdown of two common types of KMSs and how risk mitigation can be successfully accomplished.

Read more