Blog

CREA plus zanimivosti s področja informacijske varnosti

Utimaco's Payment HSMs

Utimaco Atalla AT1000 Payment HSM

Utimaco successfully completed its acquisition of the Atalla payment Hardware Security Module (HSM) and Enterprise Secure Key Manager (ESKM) product lines from Micro Focus in November 2018. This strategic acquisition has positioned Utimaco as the second-largest hardware security module (HSM) manufacturer in the world and has createed the most comprehensive HSM offering on the market.

Read more ...

Asymmetric Cryptography

What is Asymmetric Cryptography and How Does It Work?

We can roughly divide encryption algorithms into symmetric and asymmetric ones. Symmetric ones have a longer history. It can be said that they have over 2000 years of history and development. The concept of asymmetric or public-key cryptography, on the other hand, was developed in 1970s and first publicly published in 1977 by Whitfield Diffie and Martin Hellman, researchers at Stanford University.

Read more ...

Symmetric Cryptography

What is Symmetric Cryptography and How Does It Work?

When talking about symmetric cryptography we have in mind cryptographic algorithms enabling communication between a sender and a receiver. Both of them use the same cryptographic key for encryption and decryption.

Read more ...

Strong Customer Authentication - SCA

How Does Strong Customer Authentication Help Banks Fight Against Fraud?

Today, consumers rely on mobile and online transactions to manage their bank accounts, sign up for mortgages and pay bills. This convenience has a dark side: fraud and phishing are on the rise. But things are about to change, driven by regulatory compliance.

Read more ...

HSM & Blockchain

Why HSM is vital to the Blockchain Technologies

We are witnessing the rapid rise of blockchain technologies in many sectors: banks, transportation, automotive, public sector, etc. Blockchain appears often as the universal panacea and the remedy to many problems.

Read more ...

Cybersecurity Risk

How to govern cybersecurity risk at the board level

Rapidly evolving cybersecurity threats are now commanding the attention of senior business leaders and boards of directors and are no longer only the concern of IT security professionals.

Read more ...

About FIPS 140-3

What is FIPS 140

Federal Information Processing Standards (FIPS) are a collection of security standards publicly published by the US National Institute of Standards and Technology (NIST). The FIPS 140 regulation specifies requirements for cryptographic modules and covers both software and hardware components.

Read more ...

Electronic Signing in Banking

How to Deliver High-Trust Electronic Signing Solutions in Banking

International banks are rapidly evolving to cater to the digital world. With pen and paper signatures nearly obsolete, banks are investing in electronic signatures as a more secure, trustworthy replacement. 

Read more ...

Cyber Attacks and Business Disruption

Cyber Attackers Turn to Business Disruption as Primary Attack Objective

Over the course of 2019, 36% of the incidents that CrowdStrike investigated were most often caused by ransomware, destructive malware or denial of service attacks, revealing that business disruption was often the main attack objective of cybercriminals.

Read more ...

What is a Ransomware?

Ransomware Removal, Protection, and Prevention

Ransomware is malware that encrypts the data of a user. The data is rendered unusable and the victim is ordered to pay a ransom fee to decrypt the data. Ransomware has increased in sophistication in recent years.

In this article we’ll cover targets and types of ransomware attacks and some immediate steps you can take if you have been a victim of a ransomware attack. Read on to learn about ransomware protection and prevention, including pre-execution, pre-damage, and post-damage.

Read more ...
Page 1 of 2

News

Blog Post: Utimaco Atalla AT1000 Payment HSM

heroBlog post: Utimaco's Atalla AT1000 Payment HSM.

Read more ...

Gorenjska Banka with HID ActivID and HID Approve

heroAlso Gorenjska banka has decided for modern PSD2 compliant authentication solution HID ActivID Authentication Appliance with mobile app HID Approve.

Read more ...