CRYPTOMATHIC BLOG

 

Key Management (2)

4 min read

Exploring The EMV Personalization Process

EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card...

Read More
How Cryptomathic’s AWS BYOK Service Provides Secure Scalability, Durability, and Availability

3 min read

Cryptomathic AWS BYOK: Secure Scalability, Durability & Availability

In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must...

Read More
BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

3 min read

Why BYOK is Essential for Data Security and Privacy in the Cloud

The 2020 Oracle and KPMG Cloud Threat Report focuses on the key risks and challenges organizations face as they implement and maintain cloud...

Read More

5 min read

Customer Behaviour Drives Banking Security And Cryptography Architecture

Changing customer behaviour and expectations are driving the transformation of the new banking security architecture. While customers want more...

Read More
Secure AWS BYOK Service for DynamoDB

2 min read

Secure AWS BYOK Service for DynamoDB

In this article we will explain what AWS DynamoDB does and how Cryptomathic's AWS BYOK Service is an option for providing secure key management as a...

Read More
TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

4 min read

TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated. The TR-34 norm is an implementation of the...

Read More
Hosting on AWS as a European Company - What about Data Residency, Regionality, Digital Sovereignty and GDPR Compliance?

3 min read

EU AWS Hosting: Data Residency, Regionality, Digital Sovereignty, GDPR

This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.

Read More

3 min read

Secure BYOK Service for AWS Applications

This article discusses using Cryptomathic’s BYOK and key management service for securely managing cryptographic keys used in AWS applications.

Read More
Explaining the Java ECDSA Critical Vulnerability

3 min read

Explaining the Java ECDSA Critical Vulnerability

On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.

Read More