Blog

CREA plus zanimivosti s področja informacijske varnosti

Kaj je in kako deluje asimetrična kriptografija?

Šifrirne algoritme lahko v grobem ločimo na simetrične in asimetrične. Simetrični imajo daljšo zgodovino. Rečemo lahko, da sta se njihova zgodovina in razvoj pričela pred že več kot 2000 leti. Koncepti asimetrične kriptografije pa so se pričeli razvijati šele v 70ih letih in bili prvič javno objavljeni leta 1977 v članku raziskovalcev Standfordske Univerze, Whitfield Diffie in Martin Hellman.

Preberi več

Kaj je in kako deluje simetrična kriptografija?

S simetrično kriptografijo označujemo kriptografske algoritme, ki omogočajo šifrirano komunikacijo med pošiljateljem in prejemnikom, kjer za šifriranje in dešifriranje sporočil oba uporabljata enak šifrirni ključ.

Preberi več

How Does Strong Customer Authentication Help Banks Fight Against Fraud?

Today, consumers rely on mobile and online transactions to manage their bank accounts, sign up for mortgages and pay bills. This convenience has a dark side: fraud and phishing are on the rise. But things are about to change, driven by regulatory compliance.

Preberi več

Why HSM is vital to the Blockchain Technologies

We are witnessing the rapid rise of blockchain technologies in many sectors: banks, transportation, automotive, public sector, etc. Blockchain appears often as the universal panacea and the remedy to many problems.

Preberi več

How to govern cybersecurity risk at the board level

Rapidly evolving cybersecurity threats are now commanding the attention of senior business leaders and boards of directors and are no longer only the concern of IT security professionals.

Preberi več

What is FIPS 140

Federal Information Processing Standards (FIPS) are a collection of security standards publicly published by the US National Institute of Standards and Technology (NIST). The FIPS 140 regulation specifies requirements for cryptographic modules and covers both software and hardware components.

Preberi več

How to Deliver High-Trust Electronic Signing Solutions in Banking

International banks are rapidly evolving to cater to the digital world. With pen and paper signatures nearly obsolete, banks are investing in electronic signatures as a more secure, trustworthy replacement. 

Preberi več

Cyber Attackers Turn to Business Disruption as Primary Attack Objective

Over the course of 2019, 36% of the incidents that CrowdStrike investigated were most often caused by ransomware, destructive malware or denial of service attacks, revealing that business disruption was often the main attack objective of cybercriminals.

Preberi več

Ransomware Removal, Protection, and Prevention

Ransomware is malware that encrypts the data of a user. The data is rendered unusable and the victim is ordered to pay a ransom fee to decrypt the data. Ransomware has increased in sophistication in recent years.

In this article we’ll cover targets and types of ransomware attacks and some immediate steps you can take if you have been a victim of a ransomware attack. Read on to learn about ransomware protection and prevention, including pre-execution, pre-damage, and post-damage.

Preberi več

The Impact of Quantum Computing on Banking will be Gigantic

According to Deltec Bank, the Bahamas “Banks are successfully trialing quantum computers to solve problems that were previously very resource-intensive or impossible to complete.”

There has been a lot of hype around quantum computing over the last few years whereby it is poised to disrupt entire industries from telecommunications to security, manufacturing, and finance.

Preberi več

Novice

Obvladovanje kibernetske varnosti v podjetju

work 731198 1920Rezervirajte si čas v petek, 7.2.2020 od 9:00 do 11:00 v Ljubljani za aktualni dogodek na temo obvladovanja kibernetske varnosti v podjetju.

Več

Gorenjska banka s HID ActivID in HID Approve

Tudi heroGorenjska banka d.d. se je zaradi doseganja skladnosti z direktivo PSD2 in povečanja varnosti internetnega in mobilnega bančništva odločila za uvedbo rešitve HID ActivID Authentication Appliance z mobilno aplikacijo HID Approve.

Več