In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must do it securely.
In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must do it securely.
In this article we will explain what AWS DynamoDB does and how Cryptomathic's AWS BYOK Service is an option for providing secure key management as a service when using it.
This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.
This article discusses using Cryptomathic’s BYOK and key management service for securely managing cryptographic keys used in AWS applications.
An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and allows the cardholders to use them.
There are several types of key block formats used in different industries, especially the retail banking industry. The systems that use these key blocks are part of heterogeneous networks. Therefore, they need to interchange their data with other systems, potentially using different key block formats or even different key binding algorithms (key wraps, key encapsulation, etc.). In what follows, we will explain how this is possible and what techniques are used to perform that.
Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside vendors for effective cybersecurity. The financial services industry must evolve its encryption and key management strategies in line with its changing infrastructure models, advocating an inside-out approach that has proven itself over time.
A key block is a unique cryptographic structure designed to protect cryptographic keys during transport over potentially insecure networks. A team around Mohammed M Atalla invented the concept of the key block with his Atalla key block. This solved several issues created by “key variants” that were then used for transporting keys.
On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.