How DUKPT key management works in POS environments

How DUKPT key management works in POS environments

|
The DUKPT key management scheme is one of the cryptographic protocols essential to strong POS security. Here's an overview of how it works. The post How DUKPT key management works in POS environments appeared first on Intertrust Technologies ... Read More
Mitigating your Java code security debt

Mitigating your Java code security debt

|
Java code security debt is a major risk, both technically and financially. Here’s what you need to know. The post Mitigating your Java code security debt appeared first on Intertrust Technologies ... Read More
An introduction to white-box cryptography

An introduction to white-box cryptography

|
White-box cryptography is a software-based technology for protecting cryptographic operations. We cover the basics here. The post An introduction to white-box cryptography appeared first on Intertrust Technologies ... Read More
An introduction to code obfuscation

An introduction to code obfuscation

|
Code obfuscation protects software by making it more difficult for hackers to understand. Here, we look at how it works. The post An introduction to code obfuscation appeared first on Intertrust Technologies ... Read More
Nine anti-debugging techniques for application security

Nine anti-debugging techniques for application security

|
Hackers use debuggers as the basis of many attacks on applications. We take a look at the best anti-debugging techniques. The post Nine anti-debugging techniques for application security appeared first on Intertrust Technologies ... Read More
Understanding the PCI white-box cryptography requirement for CPoC

Understanding the PCI white-box cryptography requirement for CPoC

|
PCI’s new CPoC Standard includes a white-box cryptography requirement. We explain what it is and how to meet their specifications. The post Understanding the PCI white-box cryptography requirement for CPoC appeared first on Intertrust Technologies ... Read More
How to obfuscate code without degrading performance

How to obfuscate code without degrading performance

|
Obfuscating code can protect applications from hackers, but does obfuscation impact performance? We take a look. The post How to obfuscate code without degrading performance appeared first on Intertrust Technologies ... Read More