3 min read
How to Deploy and Manage Cryptography in a Project the Right Way
With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...
3 min read
With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...
3 min read
An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of...
4 min read
Last month, one of the three NIST finalists for post-quantum signature schemes received its final nail in the coffin: Ward Beullens, a PostDoc at IBM...
3 min read
The phrase “…Software is eating the world.” was famously used by Marc Andreessen in a WSJ article in 2011. No one could argue that software has...
3 min read
Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...
5 min read
Part 2 – Accelerating Time-to-Market With the increase in e-commerce and electronic communications on the one hand and the growing challenges of...
2 min read
A Key Management System (KMS) must be designed in a manner that supports the goals of each organization using the KMS. The aim of a security policy...
3 min read
The modern world of cybersecurity can be a confusing place. There are tons of data, regulations, and mandates in addition to the complex technical...
4 min read
This article discusses how tokenization may reduce false declines with credit card transactions that could negatively impact merchants.