CRYPTOMATHIC BLOG

 

Banking

4 min read

Will Cyberattacks Cause the Next Financial Crisis?

The recent instability of a major bank that catered to US tech startups caused concern for several prominent tech companies and venture capitalists,...

Read More

3 min read

EMV Personalization cryptographic requirements 

EMV Personalization is a process used to get card data into cards, mobile phones, and wearables. The process includes a variety of complicated...

Read More
Great white shark gliding lazily beneath the ocean, symbolising malware threats to mobile banking apps

5 min read

Malware Protection for Mobile Banking Apps: What You Need to Know

To bank safely online, you need additional mobile app security mechanisms that go beyond standard OS security features. In this article, we take an...

Read More

3 min read

Mobile Banking Application Protection: Challenges and Techniques

As the use of mobile phones for mobile banking and payment applications increases, so too do the security threats. Most smartphones use only two...

Read More
A Brief Overview of the Challenges Involved in Key Management for EMV Personalization : The Main Actors of EMV Personalization

3 min read

Key Management Challenges for EMV Personalization

The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in...

Read More
Payment & Banking: An Introduction to z/OS and the IBM Common Cryptographic Architecture

4 min read

An Introduction to z/OS and the IBM Common Cryptographic Architecture

IBM’s mainframe computers have been a rock-steady part of banks’ security infrastructure for many years. Originating from the local data-center...

Read More
A detailed diagram showing the various steps involved in mobile payment tokenization

4 min read

How to Secure Mobile Payment Apps with Tokenization

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. Analysts...

Read More

3 min read

Symmetric Cryptography in Financial Institutions: Key Management Challenges

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...

Read More

3 min read

How Digital Signature Deployment Models Optimise eIDAS Implementation

The eIDAS regulation provides both the technical and legal framework for electronic identification and digital signatures that the banking sector...

Read More