3 min read
Key Management in FS: Protecting Your Digital Assets, Inside and Out
Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside...
3 min read
Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside...
5 min read
This article explores the concept of financial service platforms and aligns resulting business (process) goals with the necessary crypto...
3 min read
With the introduction of PSD2, banks are forced to provide third party payment service providers (PSPs) with access to the bank’s customers’ account...
5 min read
Many organizations struggle with cryptographic key management for multiple reasons. However, these pain points can be resolved with the right tools.
4 min read
Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment...
2 min read
For traditional banks to rise above the competition they face from big tech, neobanks, and fintech, they need to add new digital skills to their...
3 min read
The healthcare market in Europe is valued at more than USD 2 trillion and is projected to increase due to the aging population not just in the EU but...
2 min read
This article describes a model that could enable an electronically signed document to be printed out and used as an original in legal proceedings, in...
3 min read
When developing an application for mobile banking, application hardening using code obfuscation is one possible way of protecting sensitive data....