Ashiq JA (guest)

Ashiq JA, Cyber Security Consultant and Security Writer with solid experience in the security field and expertise in risk management for Financial and Government sector through vulnerability management, security audits and assessments, security policies and procedures, risk mitigation, application penetration testing and secure software development. He is currently working as Cyber Security Consultant at a Federal body in United Arab Emirates.

Assignment_and_configuration_of_roles_in_a_cyrpto_key_management_system.jpg

2 min read

Assignment and Configuration of Roles in a Crypto Key Management System

This article introduces and describes the relevant roles needed to successfully manage a key management system in an organisation.

Read More
How_to_define_appropriate_crypto_periods_for_cryptographic_keys.jpg

3 min read

How to define appropriate Crypto-periods for Cryptographic keys

The period of time between the key activation and key deactivation is called the crypto period of the key. The crypto period is defined by factors...

Read More

2 min read

Server and Device Hardening Recommendations for Key Management Systems

This article discusses the procedures and techniques used in key management system hardening for servers and devices.

Read More

3 min read

How To Solve The Biggest Problems With Key Management

Cryptographic keys are used to secure data-at-rest and data-in-transit. Trying to keep them protected yet always available for use is one of the most...

Read More

4 min read

Cryptographic Key Management System Tips for the Banking Industry

This article discusses the shortcomings and learnings from penetration testing of cryptographic key management systems for banking organizations.

Read More