Dawn M. Turner (guest)

Dawn M. Turner is a professional author with a passion for technical regulations and standards, as well as for their relevance and impact on corporate operations and industry in general. Dawn has more than 10 years of IT industry experience in hardware, programming & systems & network engineering. Her educational background includes a Certificate in computer operations & programming, CompTIA and Microsoft certifications, including A+, MCSE and MCP, Associates degree with major in business & minor in computer science, Bachelors of Science degree with major in business forensics & minor in accounting and an MBA with concentrations in finance & economics.
Secure BYOK Service for AWS Applications

Secure BYOK Service for AWS Applications

This article discusses using Cryptomathic’s BYOK and key management service for securely managing cryptographic keys used in AWS applications.

eIDAS Qualified Remote Signing Technology – Different Integration Options

eIDAS Qualified Remote Signing Technology – Different Integration Options

The demand for remote digital signatures to enhance security and customer experience continues to grow across the EU as the banking and financial sector moves forward with digitalization, global expansion and technological transformation. This article presents 3 integration options for Cryptomathic’s digital signing solution.

Crypto-Agility in the Advent of Post Quantum Computing

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to threats it will present once it arrives.

Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to standardize post-quantum cryptography (PQC), NIST has begun the process of evaluating several PQC candidates in order to standardize one or more public-key algorithms that are quantum-resistant.

Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

Her we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these three methods for protecting business-critical cryptographic keys used to encrypt data in the cloud.

When Will Quantum Computing Arrive and How Will It Impact Cybersecurity?

When Will Quantum Computing Arrive and How Will It Impact Cybersecurity?

For years there has been persistent chatter that quantum computing is coming, and organizations should be prepared for its arrival. But what exactly is quantum computing and why should organizations be concerned about its impact on cybersecurity? This article explains what quantum computing is, when it is expected to arrive, and what is its anticipated impact on cybersecurity.

Manage, Handle and Control Your Own Key in the MS Azure Key Vault

Manage, Handle and Control Your Own Key in the MS Azure Key Vault

Microsoft’s Azure Key Vault Managed HSM allows customers to safeguard their cryptographic keys for their cloud applications and be standards-compliant. It is a highly available, fully managed, single-tenant cloud service that uses FIPS 140-2 Level 3 validated hardware security modules (HSMs). Here we will discuss the reasons why customers who have a centrally managed key management system on-premises in their data center should use a hosted HSM for managing their keys in the MS Azure Key Vault.

Payment & Banking Cryptography: An Overview of the Benefits of z/OS and the Z Platform

Payment & Banking Cryptography: An Overview of the Benefits of z/OS and the Z Platform

This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for cross-vendor encryption and key management.

Common Key Management System Models for the Cloud

Common Key Management System Models for the Cloud

This article explains the four primary cloud KMS pattern combinations and which are best suited for use with Cryptomathic’s Key Management System (CKMS).