2 min read
The eIDAS Agenda: Innovation, Interoperability and transparency
Digital signatures (and the accompanying concepts of encryption and authentication) have been a critical aspect of electronic communications for...
Ashiq JA, Cyber Security Consultant and Security Writer with solid experience in the security field and expertise in risk management for Financial and Government sector through vulnerability management, security audits and assessments, security policies and procedures, risk mitigation, application penetration testing and secure software development. He is currently working as Cyber Security Consultant at a Federal body in United Arab Emirates.
2 min read
Digital signatures (and the accompanying concepts of encryption and authentication) have been a critical aspect of electronic communications for...
2 min read
This article discusses the relevant factors, roles, and methods, required for remote monitoring, including auditing, identifying , and recording key...
2 min read
This article discusses the importance and usage of documentation for a key management system within an organization.
2 min read
A cryptographic zone exists between two points, where a symmetric key or asymmetric public keys are shared in order to encrypt sensitive information....
2 min read
This article introduces and describes the relevant roles needed to successfully manage a key management system in an organisation.
3 min read
The period of time between the key activation and key deactivation is called the crypto period of the key. The crypto period is defined by factors...
2 min read
This article discusses the procedures and techniques used in key management system hardening for servers and devices.
3 min read
Cryptographic keys are used to secure data-at-rest and data-in-transit. Trying to keep them protected yet always available for use is one of the most...
4 min read
This article discusses the shortcomings and learnings from penetration testing of cryptographic key management systems for banking organizations.