Dawn M. Turner (guest)

Dawn M. Turner is a professional author with a passion for technical regulations and standards, as well as for their relevance and impact on corporate operations and industry in general. Dawn has more than 10 years of IT industry experience in hardware, programming & systems & network engineering. Her educational background includes a Certificate in computer operations & programming, CompTIA and Microsoft certifications, including A+, MCSE and MCP, Associates degree with major in business & minor in computer science, Bachelors of Science degree with major in business forensics & minor in accounting and an MBA with concentrations in finance & economics.

eIDAS Qualified Remote Signing Technology – Different Integration Options

The demand for remote digital signatures to enhance security and customer experience continues to grow across the EU as the banking and financial sector moves forward with digitalization, global expansion and technological transformation. This article presents 3 integration options for Cryptomathic’s digital signing solution.

Read more

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to threats it will present once it arrives.

Read more

Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to standardize post-quantum cryptography (PQC), NIST has begun the process of evaluating several PQC candidates in order to standardize one or more public-key algorithms that are quantum-resistant.

Read more

Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

Her we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these three methods for protecting business-critical cryptographic keys used to encrypt data in the cloud.

Read more

When Will Quantum Computing Arrive and How Will It Impact Cybersecurity?

For years there has been persistent chatter that quantum computing is coming, and organizations should be prepared for its arrival. But what exactly is quantum computing and why should organizations be concerned about its impact on cybersecurity? This article explains what quantum computing is, when it is expected to arrive, and what is its anticipated impact on cybersecurity.

Read more

Manage, Handle and Control Your Own Key in the MS Azure Key Vault

Microsoft’s Azure Key Vault Managed HSM allows customers to safeguard their cryptographic keys for their cloud applications and be standards-compliant. It is a highly available, fully managed, single-tenant cloud service that uses FIPS 140-2 Level 3 validated hardware security modules (HSMs). Here we will discuss the reasons why customers who have a centrally managed key management system on-premises in their data center should use a hosted HSM for managing their keys in the MS Azure Key Vault.

Read more

Payment & Banking Cryptography: An Overview of the Benefits of z/OS and the Z Platform

This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for cross-vendor encryption and key management.

Read more

Common Key Management System Models for the Cloud

This article explains the four primary cloud KMS pattern combinations and which are best suited for use with Cryptomathic’s Key Management System (CKMS).

Read more

Understanding the Concepts of Bring Your Own Key

Bring your own key (BYOK) is a popular term relating to key management for cloud applications. However, a lack of standardization makes it confusing to understand the various meanings that exist under bring your own key. To help understand this, the Cloud Security Alliance (CSA) in its document “Key Management in Cloud Services” has been helpful in describing the various meanings and concepts surrounding “Bring Your Own Key.”

Read more