5 min read
The Evolution and Benefits of Zero-Trust Security
The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires...
A graduate of Cambridge University in Computer Science, Chris has spent the majority of his career involved with the development of Hardware Security Modules (HSMs) specializing in the on-board programming of HSMs. Chris is now the Senior Solutions Architect at Cryptomathic.
 
                  
                
                5 min read
 Chris Allen:  10. May 2023
                    
                    Chris Allen:  10. May 2023
                  The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires...
 
                  
                
                3 min read
 Chris Allen:  02. May 2023
                    
                    Chris Allen:  02. May 2023
                  The adoption of cloud computing has altered the approach organizations take toward security. Rather than concentrating on securing the perimeter of a...
 
                  
                
                5 min read
 Chris Allen:  05. April 2023
                    
                    Chris Allen:  05. April 2023
                  Under the GDPR, organizations must take appropriate measures to protect personal data from unauthorized access, use, disclosure, or destruction. One...
 
                  
                
                3 min read
 Chris Allen:  23. October 2021
                    
                    Chris Allen:  23. October 2021
                  A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...
 
                  
                
                8 min read
 Chris Allen:  13. May 2020
                    
                    Chris Allen:  13. May 2020
                  This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...
 
                  
                
                6 min read
 Chris Allen:  17. December 2019
                    
                    Chris Allen:  17. December 2019
                  With the rise of e-commerce, corporations and banks were able to more easily expand their businesses and services around the world.
 
                  
                
                7 min read
 Chris Allen:  19. March 2019
                    
                    Chris Allen:  19. March 2019
                  This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength...