CRYPTOMATHIC BLOG

 

Key Management (11)

Sercuring_web_applications_with_cryptographic_zones.jpg

2 min read

Securing Web applications with Cryptographic Zones

A cryptographic zone exists between two points, where a symmetric key or asymmetric public keys are shared in order to encrypt sensitive information....

Read More
Reducing_Payment_Credit_Card_Fraud_By_Shifting_to_EMV_technology.jpg

10 min read

Reducing Payment Card Fraud by Shifting over to EMV Chip Technology

This article gives an insight into the EMV chip technology, which is being rolled out on a world-wide scale to increase the level of fraud protection...

Read More
Assignment_and_configuration_of_roles_in_a_cyrpto_key_management_system.jpg

2 min read

Assignment and Configuration of Roles in a Crypto Key Management System

This article introduces and describes the relevant roles needed to successfully manage a key management system in an organisation.

Read More
How_to_define_appropriate_crypto_periods_for_cryptographic_keys.jpg

3 min read

How to define appropriate Crypto-periods for Cryptographic keys

The period of time between the key activation and key deactivation is called the crypto period of the key. The crypto period is defined by factors...

Read More

6 min read

Enhancing Payment Card Security By Integrating PCI with EMV Technology

This article discusses how the security protection of payment card data used in a transaction can be maximized by integrating PCI DSS with EMV...

Read More

2 min read

Server and Device Hardening Recommendations for Key Management Systems

This article discusses the procedures and techniques used in key management system hardening for servers and devices.

Read More

3 min read

Key Management Considerations For Creating a Domain Security Policy

This article discusses the necessary exchange of information between entities within a security domain and other entities outside of the security...

Read More

3 min read

How To Solve The Biggest Problems With Key Management

Cryptographic keys are used to secure data-at-rest and data-in-transit. Trying to keep them protected yet always available for use is one of the most...

Read More

4 min read

Cryptographic Key Management System Tips for the Banking Industry

This article discusses the shortcomings and learnings from penetration testing of cryptographic key management systems for banking organizations.

Read More