3 min read
EMV: The Fraud Bulldozer
These days everyone has a stake in Chip and PIN security - it can be the topic of the over-the-counter conversation as you pay, of the boardroom...
3 min read
These days everyone has a stake in Chip and PIN security - it can be the topic of the over-the-counter conversation as you pay, of the boardroom...
5 min read
Achieve Non-Repudiation of Origin (NRO) and Non-Repudiation of Emission (NRE)
4 min read
In rethinking their strategies, traditional banks have eight digital business model options to consider in order to remain competitive against...
3 min read
International trade is based on the concept of trust. In situations where there isn’t some established trust, the trading parties get their...
4 min read
The payment card industry data security standard (PCI DSS) calls for all financial institutions and merchants to protect their client's sensitive...
3 min read
Merchants are one of the corners of the ‘four corner’ model in the payment world. In what follows, we will explain some of the security mechanisms...
5 min read
This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...
3 min read
Cryptomathic's Crypto Service Gateway (CSG) helps you realize business-agile and efficient crypto services, with central control of security policy...
3 min read
An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...