1 min read
Secure-by-design key management for risk remediation against Storm-0558 type attacks
Over the course of a month in May/June 2023, hundreds of thousands of emails belonging to Microsoft customers were exposed to a hacker labelled...
1 min read
Over the course of a month in May/June 2023, hundreds of thousands of emails belonging to Microsoft customers were exposed to a hacker labelled...
2 min read
Hardware security modules (HSMs) are physical devices that provide cryptographic functions such as encryption/decryption and digital signing. They...
3 min read
Cloud storage via AWS Storage Services is a simple, reliable, and scalable way to store, retrieve and share data. As a third-party cloud vendor, AWS...
5 min read
Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.
2 min read
This article discusses the various issues around key management and presents Cryptomathic’s approach to central key and crypto management that has...
4 min read
The payment card industry data security standard (PCI DSS) calls for all financial institutions and merchants to protect their client's sensitive...
3 min read
An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...
3 min read
With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...
3 min read
This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...