2 min read
BYOK: a Solution for EBA’s New ICT and Security Risk Management Guidelines
The European Banking Authority's (EBA’s) new ICT and Security Risk Management Guidelines provide guidance for cybersecurity requirements for...
2 min read
The European Banking Authority's (EBA’s) new ICT and Security Risk Management Guidelines provide guidance for cybersecurity requirements for...
3 min read
In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...
3 min read
Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...
8 min read
This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...
6 min read
With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of...
2 min read
A well-rounded solution for securing digital transactions includes the use of both symmetric and asymmetric cryptography and keys. Each method of...
3 min read
Key distribution is perhaps the most important and crucial aspect of the ANSI X9.24-1-2017 part 1 standard. But first, let us explain what...
3 min read
In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...
4 min read
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...