5 min read
Digital Authentication - the basics
When it comes to conducting transactions, the possibility of fraud is always a risk that cannot be overlooked. In person, an individual may present...
5 min read
When it comes to conducting transactions, the possibility of fraud is always a risk that cannot be overlooked. In person, an individual may present...
2 min read
Complying with customer due diligence and KYC norms is perhaps the most important and time consuming aspect of initiating a new banking relationship....
3 min read
This article summarizes the basic cryptographic security services described in NIST Special Publication 800-57 (1, rev.4) for Key Management that can...
4 min read
EMV chips on payment cards contain cryptographic co-processors and dual interfaces that allow for contact and contactless payment options. When...
3 min read
Non-repudiation is a legal concept that is widely used in information security. It refers to any service which provides proof of the origin of data...
Cryptomathic's partner and mobile security expert, ARXAN, has published the 5th annual State of Application Security Report, which takes an in-depth...
2 min read
“Impossible!” the man exclaimed, “I designed that encryption myself! No one can break it as fast as you claim!” I am John Tränkenschuh, a CISSP-ISSAP...
2 min read
Cryptography is the foundation of protecting electronic data and cyber security. Encryption can effectively prevent breaches while also protecting...
3 min read
In 2016, the National Institute of Standards and Technology (NIST) (run by the US Department of Commerce) announced they were producing a new...