4 min read
Air India's Data Breach - data security is more crucial than ever.
Recent global events have demonstrated that high-profile hackers and state-sponsored security breaches have been steadily increasing since 2020. It...
4 min read
Recent global events have demonstrated that high-profile hackers and state-sponsored security breaches have been steadily increasing since 2020. It...
2 min read
How can keys be securely exchanged over potentially unprotected channels? The answer to this question is “key blocks”. A key block is an essential...
3 min read
The growth of electronic identification systems has been different for each European country during the past several years. European countries have...
3 min read
Over the last 10 years, enterprises have moved on from decentralized and distributed key management to centralized key management systems to provide...
5 min read
A key management system is a critical component in achieving PCI DSS compliance for a banking institution. It involves implementing a crypto system...
3 min read
What You See is What Your Sign (WYSIWYS) is a term that is used to describe an enhanced level of data integrity within a digital signature system....
1 min read
Cryptomathic has completed a successful integration of its centralized HSM and cryptography management platform, Crypto Service Gateway (CSG), with...
3 min read
The eIDAS regulation is a key foundational stone in creating the pan-European Digital Single Market. It provides the essential elements to build a...
4 min read
The cloud services provided by Microsoft Dynamics 365 are gaining rapid market share in the banking world. A burning question for the security...