CRYPTOMATHIC BLOG

 

Banking (2)

IBM's z15 Mainframe - Security, Resilience and Secure Key Management for Financial Service Platforms

3 min read

IBM z15 Mainframe & Secure Key Management for FS Platforms

Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...

Read More

3 min read

eIDAS - What You See is What You Sign (WYSIWYS) for Non-Repudiation

What You See is What Your Sign (WYSIWYS) is a term that is used to describe an enhanced level of data integrity within a digital signature system....

Read More

4 min read

Understanding the Certificate Authority in the Context of eIDAS

In this article, we will discuss the Certificate Authority (CA) in the context of eIDAS and what is required of this entity in ensuring the integrity...

Read More
An Overview of EBA's New Guidelines on ICT and Security Risk Management (EBA/GL/2019/04) in the Light of COVID-19

4 min read

Exploring the EBA's New ICT and Security Risk Management Guidelines

Considering the COVID-19 impact on digitalization, EBA’s updated Guidelines on ICT and Security Risk Assessment will help focus on priority areas,...

Read More
Open Banking - Success through Agile Alignment of Security Infrastructure, Strategy and Technology

5 min read

Open Banking: Why Agile Alignment is the Key to Success

Open banking can offer opportunities for retail banks that are faced with competition from newcomers to the banking and finance industry. For those...

Read More

3 min read

Postbank Master Key Breach: Why Strong Key Management is Essential

In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...

Read More

3 min read

Why a Banking Key Management System Must Support Atalla Key Blocks

Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...

Read More
protecting-mobile-apps-with-tokens

3 min read

Access Token Protection: Secure Connectivity for Mobile Apps

In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...

Read More

2 min read

Overview of App & Code Hardening for Mobile Banking Apps

Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...

Read More