CRYPTOMATHIC BLOG

 

Key Management (3)

In rethinking their strategies, traditional banks have eight digital business model options to consider that can assist them in staying relevant and remaining competitive against untraditional newcomers to the industry.

4 min read

Key Management: New Digital and Security Models for Banks

In rethinking their strategies, traditional banks have eight digital business model options to consider in order to remain competitive against...

Read More
Crypto-Risks-related-to-PCI-DSS-Cryptomathic

4 min read

How to Reduce Cryptography-Risks related to PCI DSS

The payment card industry data security standard (PCI DSS) calls for all financial institutions and merchants to protect their client's sensitive...

Read More
Classification-cryptpgrapjic-keys

5 min read

Classification of Cryptographic Keys

This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...

Read More
EMV Payment Security - Issuers

3 min read

EMV Payment Security - Issuers

An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...

Read More
An Overview of the Different Key Block Formats

2 min read

An Overview of the Different Key Block Formats

A key block is a unique piece of cryptography that is used to protect cryptographic keys while they are being sent over networks that might not be...

Read More
Understanding the IBM CCA key format and the importance of banking-grade key management

3 min read

Understanding IBM CCA & the Importance of Banking-grade Key Management

The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial...

Read More

3 min read

Advantages of Centralized Key Management

Traditionally, end-to-end lifecycle key management was achieved through inefficient paper-based procedures and highly resource intensive tasks...

Read More

3 min read

7 Tips for Correct Usage of Encryption to Secure eGovernment Processes

Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last...

Read More

3 min read

How to Deploy and Manage Cryptography in a Project the Right Way

With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...

Read More