4 min read
EMV Payment Security - Cardholders
Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment...
4 min read
Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment...
2 min read
This article describes a model that could enable an electronically signed document to be printed out and used as an original in legal proceedings, in...
3 min read
Code obfuscation is one of the most effective techniques for protecting sensitive data in mobile banking and payment apps. However, it's not always...
5 min read
This article aims to demystify electronic signature UK law and explain how it supports all types of electronic transactions in accordance with UK...
5 min read
Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...
8 min read
PSD2 breaks up the ways in which banks do their business, by forcing them to open up their APIs. By doing so, PSD2 challenges the way in which data...
3 min read
Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...
3 min read
The demand for remote digital signatures to enhance security and customer experience continues to grow across the EU, as the banking and financial...
2 min read
One aspect of key management is dealing with what happens when a symmetric cryptographic key is no longer needed. The section ‘Key Replacement,...