2 min read
Securing Web applications with Cryptographic Zones
A cryptographic zone exists between two points, where a symmetric key or asymmetric public keys are shared in order to encrypt sensitive information....
2 min read
A cryptographic zone exists between two points, where a symmetric key or asymmetric public keys are shared in order to encrypt sensitive information....
10 min read
This article gives an insight into the EMV chip technology, which is being rolled out on a world-wide scale to increase the level of fraud protection...
2 min read
This article introduces and describes the relevant roles needed to successfully manage a key management system in an organisation.
3 min read
The period of time between the key activation and key deactivation is called the crypto period of the key. The crypto period is defined by factors...
6 min read
This article discusses how the security protection of payment card data used in a transaction can be maximized by integrating PCI DSS with EMV...
2 min read
This article discusses the procedures and techniques used in key management system hardening for servers and devices.
3 min read
This article discusses the necessary exchange of information between entities within a security domain and other entities outside of the security...
3 min read
Cryptographic keys are used to secure data-at-rest and data-in-transit. Trying to keep them protected yet always available for use is one of the most...
4 min read
This article discusses the shortcomings and learnings from penetration testing of cryptographic key management systems for banking organizations.