How DUKPT key management works in POS environments
The DUKPT key management scheme is one of the cryptographic protocols essential to strong POS security. Here's an overview of how it works. The post How DUKPT key management works in POS environments appeared first on Intertrust Technologies ... Read More
Mitigating your Java code security debt
Java code security debt is a major risk, both technically and financially. Here’s what you need to know. The post Mitigating your Java code security debt appeared first on Intertrust Technologies ... Read More
An introduction to white-box cryptography
White-box cryptography is a software-based technology for protecting cryptographic operations. We cover the basics here. The post An introduction to white-box cryptography appeared first on Intertrust Technologies ... Read More
An introduction to code obfuscation
Code obfuscation protects software by making it more difficult for hackers to understand. Here, we look at how it works. The post An introduction to code obfuscation appeared first on Intertrust Technologies ... Read More
Nine anti-debugging techniques for application security
Hackers use debuggers as the basis of many attacks on applications. We take a look at the best anti-debugging techniques. The post Nine anti-debugging techniques for application security appeared first on Intertrust Technologies ... Read More
Understanding the PCI white-box cryptography requirement for CPoC
PCI’s new CPoC Standard includes a white-box cryptography requirement. We explain what it is and how to meet their specifications. The post Understanding the PCI white-box cryptography requirement for CPoC appeared first on Intertrust Technologies ... Read More
How to obfuscate code without degrading performance
Obfuscating code can protect applications from hackers, but does obfuscation impact performance? We take a look. The post How to obfuscate code without degrading performance appeared first on Intertrust Technologies ... Read More