CRYPTOMATHIC BLOG

 

Key Management (2)

5 min read

Customer Behaviour Drives Banking Security And Cryptography Architecture

Changing customer behaviour and expectations are driving the transformation of the new banking security architecture. While customers want more...

Read More
Secure AWS BYOK Service for DynamoDB

2 min read

Secure AWS BYOK Service for DynamoDB

In this article we will explain what AWS DynamoDB does and how Cryptomathic's AWS BYOK Service is an option for providing secure key management as a...

Read More
TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

4 min read

TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated. The TR-34 norm is an implementation of the...

Read More
Hosting on AWS as a European Company - What about Data Residency, Regionality, Digital Sovereignty and GDPR Compliance?

3 min read

EU AWS Hosting: Data Residency, Regionality, Digital Sovereignty, GDPR

This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.

Read More

3 min read

Secure BYOK Service for AWS Applications

This article discusses using Cryptomathic’s BYOK and key management service for securely managing cryptographic keys used in AWS applications.

Read More
Explaining the Java ECDSA Critical Vulnerability

3 min read

Explaining the Java ECDSA Critical Vulnerability

On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.

Read More

4 min read

IBM CCA: Hybrid Cloud & Key Management for Financial Service Platforms

In response to changing and more dynamic market demands, banks and financial institutions are turning into financial service platforms. They increase...

Read More

2 min read

How to implement efficient Key Management in a Legacy Infrastructure

This article discusses the various issues around key management and presents Cryptomathic’s approach to central key and crypto management that has...

Read More
What Do Companies Perceive as the Most Important Encryption Features?

5 min read

What Do Companies Perceive as the Most Important Encryption Features?

The need for certain encryption technology features can vary from company to company, depending on their individual needs for securing their data.

Read More