Securing a Software-Defined Future in the Automotive Sector

Securing a Software-Defined Future in the Automotive Sector

For decades, cars have been equipped with multiple connected electronic control units (ECUs) that manage various functions like entertainment, route finding, and engine controls. To prevent unauthorized access, each of these components with external connections requires security measures, resulting in a complicated network of overlapping security systems that may contain weaknesses.

Encryption for GDPR Compliance

Encryption for GDPR Compliance

Under the GDPR, organizations must take appropriate measures to protect personal data from unauthorized access, use, disclosure, or destruction. One of the measures that organizations can take is to use encryption and other cryptographic techniques to protect personal data.

Exploring The EMV Personalization Process

Exploring The EMV Personalization Process

EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card with information such as account numbers, expiration dates, and other customer-specific data. It also refers to the process of loading cryptographic algorithms and keys onto credit cards using hardware or software tools. This ensures all personal data can be safeguarded against theft or misuse.

How Cryptomathic’s AWS BYOK Service Provides Secure Scalability, Durability, and Availability

How Cryptomathic’s AWS BYOK Service Provides Secure Scalability, Durability, and Availability

In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must do it securely.

BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

The 2020 Oracle and KPMG Cloud Threat Report focuses on the key risks and challenges organizations face as they implement and maintain cloud solutions. This article highlights some of the report's findings around the growing trust in the security of cloud offerings and asserts why maintaining control of your own critical keys should be considered best-practice when considering migrating to the cloud.

Customer Behaviour Drives Banking Security And Cryptography Architecture

Customer Behaviour Drives Banking Security And Cryptography Architecture

Changing customer behaviour and expectations are driving the transformation of the new banking security architecture. While customers want more digital banking and financial services, they still see a bank's physical presence as a symbol of the institution's credibility and reputation.

Secure AWS BYOK Service for DynamoDB

Secure AWS BYOK Service for DynamoDB

In this article we will explain what AWS DynamoDB does and how Cryptomathic's AWS BYOK Service is an option for providing secure key management as a service when using it.

TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated.

The TR-34 norm is an implementation of the X9.24-2 norm. It proposes a realistic and efficient way of exchanging symmetric keys using asymmetric cryptography. This is basically a certificate-based Remote Key Loading (RKL) protocol. 

Hosting on AWS as a European Company - What about Data Residency, Regionality, Digital Sovereignty and GDPR Compliance?

Hosting on AWS as a European Company - What about Data Residency, Regionality, Digital Sovereignty and GDPR Compliance?

This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.