Chris Allen

Chris Allen

A graduate of Cambridge University in Computer Science, Chris has spent the majority of his career involved with the development of Hardware Security Modules (HSMs) specializing in the on-board programming of HSMs. Chris is now the Senior Solutions Architect at Cryptomathic.
Securing a Software-Defined Future in the Automotive Sector

Securing a Software-Defined Future in the Automotive Sector

For decades, cars have been equipped with multiple connected electronic control units (ECUs) that manage various functions like entertainment, route finding, and engine controls. To prevent unauthorized access, each of these components with external connections requires security measures, resulting in a complicated network of overlapping security systems that may contain weaknesses.

The evolution of zero-trust security

The evolution of zero-trust security

The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires authentication of users, devices, and systems prior to initial connection and multiple points of re-verification before accessing networks, systems, and data.

Bring Your Own Key (BYOK) as Part of Your Company's Data Security Strategy

Bring Your Own Key (BYOK) as Part of Your Company's Data Security Strategy

The adoption of cloud computing has altered the approach organizations take toward security. Rather than concentrating on securing the perimeter of a local database, a cloud-first landscape necessitates safeguarding the data itself.

AI is playing an increasingly important role in cybersecurity — for good and bad

AI is playing an increasingly important role in cybersecurity — for good and bad

Artificial intelligence is becoming more involved in cybersecurity, with both positive and negative implications. Companies can utilize AI tools to improve threat detection and safeguard their systems and data. However, cybercriminals can also employ the technology to carry out more advanced attacks.

Encryption for GDPR Compliance

Encryption for GDPR Compliance

Under the GDPR, organizations must take appropriate measures to protect personal data from unauthorized access, use, disclosure, or destruction. One of the measures that organizations can take is to use encryption and other cryptographic techniques to protect personal data.

What is a Crypto-Abstraction Layer?

What is a Crypto-Abstraction Layer?

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides cryptographic details from program developers that they don’t need to know about (such as the brand of hardware they are using for their source of random numbers). They are essential in the world of InfoSec because those who are expert developers are not usually expert cryptographers or even security personnel and so they need all the help they can get when it comes to implementing cryptography.

Securing the Life-cycle of a Cryptographic Key

Securing the Life-cycle of a Cryptographic Key

This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength can be determined. It also looks at some driving forces to automate key management.

Key Management and use cases for HSMs

Key Management and use cases for HSMs

With the rise of e-commerce, corporations and banks were able to more easily expand their businesses and services around the world.

Exploring the Lifecycle of a Cryptographic Key

Exploring the Lifecycle of a Cryptographic Key

This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength can be determined.