3 min read
How Common Criteria Helps Organizations Choose the Right HSM
Hardware Security Modules (HSMs) are used in all card payment systems (as well as various other applications that require strong security) to protect...
3 min read
Hardware Security Modules (HSMs) are used in all card payment systems (as well as various other applications that require strong security) to protect...
3 min read
As part of the global drive for digital transformation, legally binding digital signatures are at the forefront of many businesses’ ambitions to...
5 min read
Last week order for 186 double-decker trains was nullified due to a legal formality surrounding the Qualified Electronic Signature used to ink the...
5 min read
This article talks about how different factors and controls can affect the strength and effectiveness of a cryptographic system's security. It gives...
3 min read
The financial service industry has always been innovator in technology adoption. This is not surprising considering the nature of the industry with...
4 min read
Under pressure from sophisticated attacks and rising fraud, many B2C organisations of the financial industry are currently enhancing the static...
3 min read
This article briefly summarizes the symmetric cryptographic key utilization and storage requirements as described by the ANSI X9.24-1-2017 (part 1)...
2 min read
Great strides have been made in the retail banking and payments space via innovative financial technology products. However, in the corporate banking...
6 min read
Ever since the EU mandated the introduction of biometric ePassports containing fingerprints there has been a flurry of technology development and...