CRYPTOMATHIC BLOG

 

Banking (2)

3 min read

Optimizing eIDAS with Digital Signature Deployment Models

The eIDAS regulation provides both the technical and legal framework for electronic identification and digital signatures that the banking sector...

Read More
IBM's z15 Mainframe - Security, Resilience and Secure Key Management for Financial Service Platforms

3 min read

IBM z15 Mainframe: Key Management & Resilience

Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...

Read More

3 min read

eIDAS: What You See is What You Sign for Non-Repudiation

What You See is What Your Sign (WYSIWYS) is a term that is used to describe an enhanced level of data integrity within a digital signature system....

Read More

4 min read

Understanding the Certificate Authority in the Context of eIDAS

In this article, we will discuss the Certificate Authority (CA) in the context of eIDAS and what is required of this entity in ensuring the integrity...

Read More
An Overview of EBA's New Guidelines on ICT and Security Risk Management (EBA/GL/2019/04) in the Light of COVID-19

4 min read

EBA ICT & Security Risk Guidelines: A COVID-19 Perspective

Considering the COVID-19 impact on digitalization, EBA’s updated Guidelines on ICT and Security Risk Assessment will help focus on priority areas,...

Read More
Open Banking - Success through Agile Alignment of Security Infrastructure, Strategy and Technology

5 min read

Agile Alignment: The Key to Open Banking Success

Open banking can offer opportunities for retail banks that are faced with competition from newcomers to the banking and finance industry. For those...

Read More

3 min read

Postbank Master Key Breach: Strong Key Management Importance

In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...

Read More

3 min read

Why a Banking KMS Must Support Atalla Key Blocks

Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...

Read More
protecting-mobile-apps-with-tokens

3 min read

Access Token Protection for Secure Mobile Connectivity

In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...

Read More