What Do Companies Perceive as the Most Important Encryption Features?

What Do Companies Perceive as the Most Important Encryption Features?

The need for certain encryption technology features can vary from company to company, depending on their individual needs for securing their data. The recent Ponemon Institute survey, Global Encryption Trends Study, showed that some encryption features are considered more essential than others when considering an encryption solution, especially for strong key management purposes.

ANSI X9.24-1-2017: Key Utilization and Storage

ANSI X9.24-1-2017: Key Utilization and Storage

This article briefly summarizes the symmetric cryptographic key utilization and storage requirements as described by the ANSI X9.24-1-2017 (part 1) standard.

Understanding the IBM CCA key format and the importance of banking-grade key management

Understanding the IBM CCA key format and the importance of banking-grade key management

The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial transactions.

The Postbank Master Key Breach in South Africa: Using Strong Key Management in a Banking Environment is a Necessity

The Postbank Master Key Breach in South Africa: Using Strong Key Management in a Banking Environment is a Necessity

In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South Africa, have become known. This information is quite serious as it relates to a fraud that cost the bank millions of dollars and significantly damaged its reputation.

Why a Banking Key Management System Must Support Atalla Key Blocks

Why a Banking Key Management System Must Support Atalla Key Blocks

Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions are secured daily using hardware security modules (HSMs) and the Atalla key block format that follows TR-31 guidelines. Here we will explain a bit about AKB and why a banking-grade key management system (KMS) must support it.

Banks Need to be Digitally Agile and Cryptography Should be the Enabler

Banks Need to be Digitally Agile and Cryptography Should be the Enabler

For traditional banks to rise above the competition they face from big tech, neobanks, and fintechs, they need to add new digital skills to their traditional banking capabilities; positioning themselves as agile providers of financial services by providing demand-driven services at the right time and place.

Securing the Life-cycle of a Cryptographic Key

Securing the Life-cycle of a Cryptographic Key

This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength can be determined. It also looks at some driving forces to automate key management.

High-Security Cryptographic Key Management for the Hybrid-Cloud User

High-Security Cryptographic Key Management for the Hybrid-Cloud User

When migrating their business-critical applications and cryptography to the cloud, banks and financial institutions face a number of concerns. The push to adopt cloud computing for the sake of efficiency and innovation must be balanced with the responsibility to protect sensitive data and processes.

ANSI X9.24-1-2017: Key Distribution 

ANSI X9.24-1-2017: Key Distribution 

Key distribution is perhaps the most important and crucial aspect of the ANSI X9.24-1-2017 part 1 standard. But first, let us explain what cryptographic key distribution is.