The Critical Need for Key Management Beyond Storage

June 02, 2017 / by Chuck White

The need for Key Management beyond storage is effectively the need to provide security controls that reduce risk when authority is separated from responsibility. The published leak of National Geospatial Agency data onto Amazon S3 by a defense contractor shines a spotlight on both the problem and the solution.

Read more

A Primer on FIPS 140-2 Certifications

May 25, 2017 / by Kevin Mooney

Last week I spent my time attending the International Cryptographic Module Conference outside of Washington D.C. A recurring topic of interest to those in attendance was FIPS 140-2. There were a lot of questions around the topic, so I thought it beneficial to explain the basics of FIPS 140-2 certifications.

Read more
1 ...
2 3 4 5 6
Page 6 of 6

Subscribe to Email Updates

Recent Posts