Agile Cryptography for Turnaround Business Models of Retail Banks

Agile Cryptography for Turnaround Business Models of Retail Banks

Going forward, it is imperative for existing banks to develop a strategy for sustaining their current operations and expanding in a digitized, cyber-secured full-service model.

A Brief Overview of the Challenges Involved in Key Management for EMV Personalization: The Main Actors of EMV Personalization

A Brief Overview of the Challenges Involved in Key Management for EMV Personalization: The Main Actors of EMV Personalization

The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in EMV personalization, as well as the key management involved; which is both complex and mandatory.

Secure Connectivity for Mobile Banking and Payment Apps: Strong Authentication

Secure Connectivity for Mobile Banking and Payment Apps: Strong Authentication

Here we provide a short overview of why strong authentication is seriously needed to provide security for mobile banking and payment applications. 

Tokenization and Securing Mobile Payments Apps

Tokenization and Securing Mobile Payments Apps

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. In 2017, China’s mobile payments market was estimated at $17 trillion. The growth of mobile payments depends totally on the prevention of data breaches, and for this, there is an important technology that should be designed into the mix of security mechanisms: Tokenization.

Remote Signing Services for Banks, TSPs and Industrial Customers - An Overview

Remote Signing Services for Banks, TSPs and Industrial Customers - An Overview

eIDAS provides the technical and legal framework needed for electronic identification and digital signatures to allow the banking industry to digitize its processes fully. This article introduces the technology required for remote signing at a qualified electronic signature (QES) level.

Summary of the Practical Key Management Challenges Behind Symmetric Cryptography in Financial Institutions 

Summary of the Practical Key Management Challenges Behind Symmetric Cryptography in Financial Institutions 

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten advantages as opposed to asymmetric cryptography.

Hybrid Cloud & Key Management for Financial Service Platforms: IBM's New CCA 7.0 and the Mainframe z15

Hybrid Cloud & Key Management for Financial Service Platforms: IBM's New CCA 7.0 and the Mainframe z15

In response to changing and more dynamic market demands, banks and financial institutions are turning into financial service platforms. They increase the extent of their digital transformations across the hybrid cloud, guided by three motivating factors:

Benefits of eIDAS Qualified Signature Creation Devices and Why Cryptomathic Signer has the Strongest Security Credentials

Benefits of eIDAS Qualified Signature Creation Devices and Why Cryptomathic Signer has the Strongest Security Credentials

The intent of the eIDAS regulation is to create a portfolio of technical and legal standards that enhance the security, legal validity, and acceptance of electronic transactions used to conduct business online or official business across EU member state borders.

Customer Demand Helps to Co-Shape Banking Security and Cryptography Architecture

Customer Demand Helps to Co-Shape Banking Security and Cryptography Architecture

Client behaviors and expectations are behind the transformation that is currently reshaping the new banking security architecture. While clients want more digital banking and financial services, they still look to a bank’s physical presence as one that is symbolic for building trust, credibility, and the reputation of the institution.