5 min read
Key Types and Crypto-Periods: NIST Key Management Guide
This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key...
5 min read
This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key...
3 min read
In this article, we will review some of the constraints of an EMV tokenization solution when it comes to FIPS and more generally, NIST considerations.
3 min read
Financial institutions and solution providers are busy implementing the requirements of Strong Customer Authentication (SCA) under the Revised...
6 min read
This article discusses the benefits eIDs provide for both banks and customers in streamlining cross-border transactions and what is required under...
5 min read
The EMV consortium released several standards detailing how “network” tokenization should be handled. There is now a general consensus within the...
6 min read
EMV is short for EUROPAY-VISA-MASTERCARD. This term is used to refer to standards that have been designed to improve the security of credit and debit...
2 min read
This article explains the concept of meta-data in the context of cryptographic keys, explaining why it is used and the necessity to manage it well.
4 min read
The concept of a token has been used in the digital world for almost 50 years to separate and protect real data elements from exposure. In recent...
4 min read
In many parts of the world, including the European Union and the United States, businesses have adopted digital signing as a way to implement...