5 min read
The evolution of zero-trust security
The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires...
A graduate of Cambridge University in Computer Science, Chris has spent the majority of his career involved with the development of Hardware Security Modules (HSMs) specializing in the on-board programming of HSMs. Chris is now the Senior Solutions Architect at Cryptomathic.
5 min read
The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires...
3 min read
The adoption of cloud computing has altered the approach organizations take toward security. Rather than concentrating on securing the perimeter of a...
5 min read
Under the GDPR, organizations must take appropriate measures to protect personal data from unauthorized access, use, disclosure, or destruction. One...
3 min read
A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...
8 min read
This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...
6 min read
With the rise of e-commerce, corporations and banks were able to more easily expand their businesses and services around the world.
7 min read
This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength...