Hosting on AWS as a European Company - What about Data Residency, Regionality, Digital Sovereignty and GDPR Compliance?

Hosting on AWS as a European Company - What about Data Residency, Regionality, Digital Sovereignty and GDPR Compliance?

This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.

Secure BYOK Service for AWS Applications

Secure BYOK Service for AWS Applications

This article discusses using Cryptomathic’s BYOK and key management service for securely managing cryptographic keys used in AWS applications.

eSigning High-Value Documents - Prioritizing Security In The Digital Era

eSigning High-Value Documents - Prioritizing Security In The Digital Era

As certain industries are moving ahead with digital transformation projects, online signing processes are a step forward in optimizing business practices.

EMV Payment Security - Acquirers

EMV Payment Security - Acquirers

In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating from the merchant to and from the issuer. In the model, the acquirer is the merchant’s bank.

Digital Signatures vs Wet Signing: The Implications Of Alleged Forged Signatures During The Home Buying Process

Digital Signatures vs Wet Signing: The Implications Of Alleged Forged Signatures During The Home Buying Process

Mortgage fraud is a serious crime. Once executed and signed, a mortgage deed is a legally binding contract. The responsibility of trying to prove that signatures have been forged relies on the individual(s) having to prove it. It involves time and cost and, in many circumstances, requires evidence based on expert opinion.

Agile Cryptography for Turnaround Business Models of Retail Banks

Agile Cryptography for Turnaround Business Models of Retail Banks

Going forward, it is imperative for existing banks to develop a strategy for sustaining their current operations and expanding in a digitized, cyber-secured full-service model.

Schrems II puts the brakes on AWS cloud adoption for Denmark’s education and pension services

Schrems II puts the brakes on AWS cloud adoption for Denmark’s education and pension services

For over two years, the Schrems II decision from the European Court of Justice has caused tremors in IT departments across EU countries, such as Denmark. This has raised serious questions about the legality of using American cloud giants.

Beyond the Video-Ident Hack: Securely Sign with a Smile

Beyond the Video-Ident Hack: Securely Sign with a Smile

For trustworthy remote identity verification, a proof of the authenticity of the identity card and of the integrity of its contents is needed, along with reliable binding between the ID card and the identifying individual. Verification of biometric markers in a remote video identification procedure has long been undermined by deep fake technology. The recent hack of the Video-Ident procedure presents a more scalable attack and has further destroyed trust in online identity verification. A solution to this problem lies in the utilization of the NFC chip that is built into a growing number of national identity cards.

EMV Payment Security - Merchants

EMV Payment Security - Merchants

 

Merchants are one of the corners of the ‘four corner’ model in the payment world. In what follows, we will explain some of the security mechanisms for Merchants to prevent unauthorized transactions and payment card fraud.