Dawn M. Turner (guest)

Dawn M. Turner is a professional author with a passion for technical regulations and standards, as well as for their relevance and impact on corporate operations and industry in general. Dawn has more than 10 years of IT industry experience in hardware, programming & systems & network engineering. Her educational background includes a Certificate in computer operations & programming, CompTIA and Microsoft certifications, including A+, MCSE and MCP, Associates degree with major in business & minor in computer science, Bachelors of Science degree with major in business forensics & minor in accounting and an MBA with concentrations in finance & economics.
How Should Companies Get Prepared for Quantum Computing Related Threats?

How Should Companies Get Prepared for Quantum Computing Related Threats?

It is not a question of if, but when quantum computing will arrive and be used for malicious purposes, as the expectation is that this new technology will be capable of cracking most, if not all, of the asymmetric cryptographic algorithms currently used to protect data. While quantum computing is not expected to arrive until 2030, the time is now for companies to get prepared for these threats that are related to this new technology. The question is, however, when and how they should prepare.

Secure BYOK Service for AWS S3 Buckets

Secure BYOK Service for AWS S3 Buckets

Keeping data safe in the Cloud has always been a concern for users, hence the need for encrypting data. With more businesses taking advantage of what the cloud has to offer with cloud-based services, there has been increased focus on who should manage the keys used to encrypt and decrypt data.

This article takes a look at how Cryptomathic’s AWS BYOK Service can provide better control and auditability of key encryption keys for the Amazon Simple Storage Service (Amazon S3).

How Cryptomathic’s AWS BYOK Service Provides Secure Scalability, Durability, and Availability

How Cryptomathic’s AWS BYOK Service Provides Secure Scalability, Durability, and Availability

In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must do it securely.

Cryptomathic’s AWS BYOK Service for Enhanced Auditability in The Cloud

Cryptomathic’s AWS BYOK Service for Enhanced Auditability in The Cloud

Many industries, including banking, finance and healthcare are required to comply with data security standards under regulations like SOC, NIST, PCI, GDPR or HIPAA. Such industries can be subject to costly penalties if they are unable to prove their compliance in the event of a security breach.

Secure BYOK for AWS Simple Storage Services (S3)

Secure BYOK for AWS Simple Storage Services (S3)

Cloud storage via AWS Storage Services is a simple, reliable, and scalable way to store, retrieve and share data. As a third-party cloud vendor, AWS manages and operates the data storage as a service. Because the data is delivered on demand using JIT capacity and costs, it eliminates having to buy and manage your own infrastructure for storing data. This service supplies anytime, anywhere data access which gives agility, durability, and global scalability for users. To maintain compliance with major industry standards like GDPR, HIPAA, PCI-DSS while harnessing the advantages of cloud storage, this article suggests a bring your own key solution with automated audit features.

Accenture's Insights on Crypto-Agility

Accenture's Insights on Crypto-Agility

This article discusses Accenture’s insights on crypto-agility that were derived from its recent research report on preparing for post-quantum decryption.

BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

The 2020 Oracle and KPMG Cloud Threat Report focuses on the key risks and challenges organizations face as they implement and maintain cloud solutions. This article highlights some of the report's findings around the growing trust in the security of cloud offerings and asserts why maintaining control of your own critical keys should be considered best-practice when considering migrating to the cloud.

How Prepared are Companies for Quantum Computing Cybersecurity Risk?

How Prepared are Companies for Quantum Computing Cybersecurity Risk?

This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current threats are.

How Cryptomathic’s AWS BYOK Service Provides Expanded Security

How Cryptomathic’s AWS BYOK Service Provides Expanded Security

This article discusses how Cryptomathic’s AWS BYOK Service delivers expanded security to protect cryptographic keys while using AWS cloud applications.