Ashiq JA (guest)

Ashiq JA, Cyber Security Consultant and Security Writer with solid experience in the security field and expertise in risk management for Financial and Government sector through vulnerability management, security audits and assessments, security policies and procedures, risk mitigation, application penetration testing and secure software development. He is currently working as Cyber Security Consultant at a Federal body in United Arab Emirates.

2 min read

The eIDAS Agenda: Innovation, Interoperability and transparency

Digital signatures (and the accompanying concepts of encryption and authentication) have been a critical aspect of electronic communications for...

Read More
Remote_monitoring.jpg

2 min read

Remote Monitoring: Audit, Spot & Record Key Management Security Events

This article discusses the relevant factors, roles, and methods, required for remote monitoring, including auditing, identifying , and recording key...

Read More

2 min read

Expert’s Guidelines on how to document a Key Management System

This article discusses the importance and usage of documentation for a key management system within an organization.

Read More
Sercuring_web_applications_with_cryptographic_zones.jpg

2 min read

Securing Web applications with Cryptographic Zones

A cryptographic zone exists between two points, where a symmetric key or asymmetric public keys are shared in order to encrypt sensitive information....

Read More
Assignment_and_configuration_of_roles_in_a_cyrpto_key_management_system.jpg

2 min read

Assignment and Configuration of Roles in a Crypto Key Management System

This article introduces and describes the relevant roles needed to successfully manage a key management system in an organisation.

Read More
How_to_define_appropriate_crypto_periods_for_cryptographic_keys.jpg

3 min read

How to define appropriate Crypto-periods for Cryptographic keys

The period of time between the key activation and key deactivation is called the crypto period of the key. The crypto period is defined by factors...

Read More

2 min read

Server and Device Hardening Recommendations for Key Management Systems

This article discusses the procedures and techniques used in key management system hardening for servers and devices.

Read More

3 min read

How To Solve The Biggest Problems With Key Management

Cryptographic keys are used to secure data-at-rest and data-in-transit. Trying to keep them protected yet always available for use is one of the most...

Read More

4 min read

Cryptographic Key Management System Tips for the Banking Industry

This article discusses the shortcomings and learnings from penetration testing of cryptographic key management systems for banking organizations.

Read More