Mobile Point of Sale Compliance – What is it all about?

Mobile Point of Sale Compliance – What is it all about?

PCI have recently released the new standard and compliance program for Mobile Payments on Commercial off-the-shelf devices (MPoC). This blog is the first of a series discussing Mobile Payments and the security requirements that need to be met. This one describes the compliance environment and the history of how it has reached this point.

Secure BYOK Service for AWS S3 Buckets

Secure BYOK Service for AWS S3 Buckets

Keeping data safe in the Cloud has always been a concern for users, hence the need for encrypting data. With more businesses taking advantage of what the cloud has to offer with cloud-based services, there has been increased focus on who should manage the keys used to encrypt and decrypt data.

This article takes a look at how Cryptomathic’s AWS BYOK Service can provide better control and auditability of key encryption keys for the Amazon Simple Storage Service (Amazon S3).

The Four Corners Model for Card Payment Security and Key Management

The Four Corners Model for Card Payment Security and Key Management

The “Four Corners” model, also called the “Four Party Scheme”, is utilized in almost all standard card payment systems across the globe. Here, we talk about that model and explain what kind of hardware security module (HSM) is needed for each of its components involved in the cryptographic process.

How Cryptomathic’s AWS BYOK Service Provides Industry Grade Compliance

How Cryptomathic’s AWS BYOK Service Provides Industry Grade Compliance

The AWS cloud is enjoying increasing popularity with its very high levels of scalability, durability, and availability. It releases companies from the burden of 24/7 service and maintenance and is available in many regions, ensuring that data stays in a confined area of jurisdiction. Here we look at how Cryptomathic's AWS BYOK Service can help your business generate and control your own keys for AWS to remain compliant with industry standards, easily auditable, and secure.

Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.

EMV Payment Security - Acquirers

EMV Payment Security - Acquirers

In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating from the merchant to and from the issuer. In the model, the acquirer is the merchant’s bank.

How to Reduce Cryptography-Risks related to PCI DSS

How to Reduce Cryptography-Risks related to PCI DSS

The payment card industry data security standard (PCI DSS) calls for all financial institutions and merchants to protect their client's sensitive data, typically including strong cryptography as dictated by PCI DSS requirement 3. Most organizations empty this burden on the IT department or IT management teams and hope that all compliance requirements are met. However, in most cases when a data breach occurs, the burden lies on the shoulders of the C-level management, who are left to answer the difficult questions.

EMV Payment Security - Merchants

EMV Payment Security - Merchants

 

Merchants are one of the corners of the ‘four corner’ model in the payment world. In what follows, we will explain some of the security mechanisms for Merchants to prevent unauthorized transactions and payment card fraud.

EMV Payment Security - Issuers

EMV Payment Security - Issuers

An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and allows the cardholders to use them.