This article highlights the NIST key lifecycle recommendations in relation to PCI DSS compliance.Read more
The PSD2 Directive opens a considerable market for new solutions in e-banking, account information services and payment initiation services.Read more
This article outlines cryptographic operations and best practices you should follow to make your applications or systems secure.
Cryptographic algorithms can be categorized into three classes: Hash functions, Symmetric and Asymmetric algorithms. This article sheds light on their differences, purpose and main fields of application.Read more