Ashiq JA (guest)

Ashiq JA, Cyber Security Consultant and Security Writer with solid experience in the security field and expertise in risk management for Financial and Government sector through vulnerability management, security audits and assessments, security policies and procedures, risk mitigation, application penetration testing and secure software development. He is currently working as Cyber Security Consultant at a Federal body in United Arab Emirates.

2 min read

How to implement efficient Key Management in a Legacy Infrastructure

This article discusses the various issues around key management and presents Cryptomathic’s approach to central key and crypto management that has...

Read More

3 min read

Advantages of Centralized Key Management

Traditionally, end-to-end lifecycle key management was achieved through inefficient paper-based procedures and highly resource intensive tasks...

Read More

3 min read

7 Tips for Correct Usage of Encryption to Secure eGovernment Processes

Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last...

Read More

3 min read

How to Deploy and Manage Cryptography in a Project the Right Way

With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...

Read More

2 min read

Top 5 Protective Measures for Key Management Systems and Malware

Malware infections have become more evolved and sophisticated. Similarly, the technologies for preventing malware threats and attacks have evolved to...

Read More
Using_a_centralized_key_management_system_to_enforce_information_security_policies.jpg

2 min read

How to Use a Centralized KMS to Enforce Information Security Policies

A Key Management System (KMS) must be designed in a manner that supports the goals of each organization using the KMS. The aim of a security policy...

Read More
What_is_the_right_user_interface_for_a_key_management_system.jpg

2 min read

What is the right user interface for a Key Management System?

User interface design and usability are the deciding factors in attaining a good user experience for most IT deployments, including key management...

Read More

3 min read

Recommendations for Providing Digital Signature Services

With the ever-growing number of electronic transactions and documents, the use of digital signatures make it possible to trust and act upon these...

Read More
How_Third_Party_testing_can_improve_key_management_system_security.jpg

3 min read

How Third Party Testing Can Improve Key Management System Security

For identifying, detecting, and eliminating flaws in a key management system, independent third-party testing is required (KMS). Third-party testing...

Read More