6 min read
Cryptographic Key Management - the Risks and Mitigation
With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...
6 min read
With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...
5 min read
Part 2 – Accelerating Time-to-Market With the increase in e-commerce and electronic communications on the one hand and the growing challenges of...
4 min read
This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for...
2 min read
A number of serious security vulnerabilities, collectively known under the names of “Meltdown” and “Spectre” [1][2], have recently been discovered in...
3 min read
The PCI Council requires most actors of payment networks to implement ANSI X9.24/TR-31-compliant key blocks to wrap and securely transmit, transfer,...
4 min read
Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...
3 min read
A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...
2 min read
In this article, we will explore some of the reasons why HSMs can be difficult to use and look at a novel solution that helps to overcome these...
2 min read
This article proposes answers to a series of frequently asked questions (FAQs) about key blocks.