CRYPTOMATHIC BLOG

 

Banking

How Generative AI is Transforming Cyber Threats & How to Stay Secure

3 min read

How Generative AI is Transforming Cyber Threats & How to Stay Secure

For an internal event atCryptomathic, we invited some our clients from the financial and trust service sectors to share their insight on future...

Read More

4 min read

Will Cyberattacks Cause the Next Financial Crisis?

The recent instability of a major bank that catered to US tech startups caused concern for several prominent tech companies and venture capitalists,...

Read More

3 min read

EMV Personalization cryptographic requirements 

EMV Personalization is a process used to get card data into cards, mobile phones, and wearables. The process includes a variety of complicated...

Read More
Great white shark gliding lazily beneath the ocean, symbolising malware threats to mobile banking apps

5 min read

Understanding Malware Protection for Mobile Banking Apps

To bank safely online, you need additional mobile app security mechanisms that go beyond standard OS security features. In this article, we take an...

Read More

3 min read

Mobile Banking Application Protection: Challenges and Techniques

As the use of mobile phones for mobile banking and payment applications increases, so too do the security threats. Most smartphones use only two...

Read More
A Brief Overview of the Challenges Involved in Key Management for EMV Personalization : The Main Actors of EMV Personalization

3 min read

Challenges in Key Management for EMV Personalization

The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in...

Read More
Payment & Banking: An Introduction to z/OS and the IBM Common Cryptographic Architecture

4 min read

Introduction to z/OS & IBM Cryptographic Architecture

IBM’s mainframe computers have been a rock-steady part of banks’ security infrastructure for many years. Originating from the local data-center...

Read More
A detailed diagram showing the various steps involved in mobile payment tokenization

4 min read

How Tokenization Secures Mobile Payment Applications

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. Analysts...

Read More

3 min read

Key Management Challenges in Financial Symmetric Cryptography Systems

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...

Read More