3 min read
Cryptomathic AWS BYOK: Secure Scalability, Durability & Availability
In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must...
3 min read
In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must...
3 min read
The 2020 Oracle and KPMG Cloud Threat Report focuses on the key risks and challenges organizations face as they implement and maintain cloud...
4 min read
Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated. The TR-34 norm is an implementation of the...
3 min read
This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.
3 min read
On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.
5 min read
This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...
3 min read
An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...
2 min read
A key block is a unique piece of cryptography that is used to protect cryptographic keys while they are being sent over networks that might not be...
3 min read
The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial...