NIST's Hybrid Mode Approach to Post Quantum Computing - why crypto agility is crucial

With the advent of information security, the importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.

Read more

Utimaco ESKM and the Data-Centric Security Problem

Data-centric security is a general concept of software and IT architecture where the data are at the center of the system and prevail over application and network. 

Read more

Utimaco Atalla AT1000 and PIN Translation

Here we will explain the different environments that may exist around pin translation and answer such questions as:

Read more

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 3: Achieving Transactional & Account Security

The Regulatory Technical Standards (RTS) is a supplementary directive designed to complement the Revised Payment Service Directives (PSD2), eIDAS and any other such cases where Strong Customer Authentication is required. 

Read more

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 2: PSD2

The Revised Payment Service Directive (PSD2) is nothing short of revolutionary when it comes to the retail payment services industry in Europe. In fact, many of the innovative new products and services that PSD2 will indirectly create are likely to percolate to every sector of the economy.

Read more

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 1: eIDAS

A major challenge faced by the EU in the creation of a Digital Single Market is finding the right balance between processes that can be harmonized and standardized and those that need to remain flexible to cater to the demands of the various Member States. It is clear that eIDAS has been designed not only keeping this mind, but actually by taking it as the fundamental guiding principle during its creation.

Read more

The PCI PTS HSM v1 expires - Guidelines for the Transition Towards v3

Corporate organizations and banks have expanded their businesses around the world by using e-commerce which is secured by various security services such as encryption, decryption and strong authentication between identities and applications. Main cryptographic security control for the protection of business transactions is the Hardware Security Module (HSM).

Read more

eiDAS & PSD2 - The New Payments Industry Paradigm in Europe

The Revised Payment Services Directive (PSD2) is poised to revolutionize the payment services industry. Its underlying principles mean that industry participants will have to innovate in terms of product structuring, service delivery, user experience and optimize in terms of costs to retain market share.

Read more

Open Banking  - The 3 Main Focus Areas for Banks and FinTech

2019 has set the stage for the next round of the match-up between Banks on one side and FinTech [1], BigTech and other challengers on the other. Come September, the requirements for Strong Customer Authentication will come into play and the race is on to get a head start. Some banks are indeed dragging their feet and just trying to do the bare minimum to be compliant. While others are more active and looking to one-up the disruptors while they are ahead.

Read more

Ready to take off?

Download our HSM simulator!

Register for free