3 min read
Centralized Key Management: Challenges & Opportunities
Over the last 10 years, enterprises have moved on from decentralized and distributed key management to centralized key management systems to provide...
3 min read
Over the last 10 years, enterprises have moved on from decentralized and distributed key management to centralized key management systems to provide...
3 min read
This article explains some of the cryptographic key management tasks involved in demonstrating and proving compliance to acceptable standards, and...
3 min read
The Key Management Interoperability Protocol standard intends to provide interoperability across various key management environments and hence to...
3 min read
In this article, we look at the process of a keyshare generator and key derivation as described by the ANSI X9.24-1-2017 standard. This process is...
5 min read
This article discusses the concerns surrounding key management for cloud environments and how Cryptomathic addresses them by bringing banking-grade...
2 min read
The European Banking Authority's (EBA’s) new ICT and Security Risk Management Guidelines provide guidance for cybersecurity requirements for...
3 min read
In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...
3 min read
Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...
8 min read
This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...