4 min read
IBM z15 Mainframe & Secure Key Management for FS Platforms
Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...
4 min read
Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...
4 min read
There is no silver bullet when it comes to securing “the” Internet of Things; instead, a careful analysis of the individual application is needed. In...
3 min read
The modern world of cybersecurity can be a confusing place. There are tons of data, regulations, and mandates in addition to the complex technical...
4 min read
This article discusses how tokenization may reduce false declines with credit card transactions that could negatively impact merchants.
3 min read
In Part 1 of our series exploring the wide footprint of the eIDAS regulation, we looked at things like PSD2, the European Citizen’s Initiative, and...
3 min read
A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...
2 min read
In this article, we will explore some of the reasons why HSMs can be difficult to use and look at a novel solution that helps to overcome these...
2 min read
This article proposes answers to a series of frequently asked questions (FAQs) about key blocks.
3 min read
Hardware Security Modules (HSMs) are used in all card payment systems (as well as various other applications that require strong security) to protect...