2 min read
Distributed vs Centralized Key Management
The need for mitigating risk with an appropriate key management system (KMS) is critical to the success of any organization that shares sensitive...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
2 min read
The need for mitigating risk with an appropriate key management system (KMS) is critical to the success of any organization that shares sensitive...
3 min read
For identifying, detecting, and eliminating flaws in a key management system, independent third-party testing is required (KMS). Third-party testing...
3 min read
In a recent article, we looked at how eIDAS can help SMEs grow and prosper. SMEs are undoubtedly the lifeblood of any economy which means that EU...
3 min read
What You See Is What You Sign (WYSIWYS) refers to the part of any signature process, where you read a document you intend to sign, and ensure that...
4 min read
The aim of this article is inform you on how to implement proper key management and to answer 3 important questions regarding centralized and...
2 min read
I once consulted a bank about their painstakingly slow cryptography and security processing system. After a week of searching, I examined the...
3 min read
Cryptography has come a long way since ancient times, and the pace of development has been especially quick over the last 2 decades. Indeed, many...
3 min read
Crypto-agility, or cryptographic agility, is the capacity for an information security system to adopt an alternative to the original encryption...
3 min read
According to draft guidance published by NIST on July 19, 2018, the Triple Data Encryption Algorithm (TDEA) or 3DES is officially being retired. The...