Dawn M. Turner (guest)

Dawn M. Turner is a professional author with a passion for technical regulations and standards, as well as for their relevance and impact on corporate operations and industry in general. Dawn has more than 10 years of IT industry experience in hardware, programming & systems & network engineering. Her educational background includes a Certificate in computer operations & programming, CompTIA and Microsoft certifications, including A+, MCSE and MCP, Associates degree with major in business & minor in computer science, Bachelors of Science degree with major in business forensics & minor in accounting and an MBA with concentrations in finance & economics.

Secure AWS BYOK Service for DynamoDB

2 min read

Secure AWS BYOK Service for DynamoDB

In this article we will explain what AWS DynamoDB does and how Cryptomathic's AWS BYOK Service is an option for providing secure key management as a...

Read More

3 min read

Secure BYOK Service for AWS Applications

This article discusses using Cryptomathic’s BYOK and key management service for securely managing cryptographic keys used in AWS applications.

Read More
Racks of servers supporting a secure signature creation device

3 min read

What is a Secure Signature Creation Device? Types and Requirements

As defined by Regulation (EU) No 910/2014 (eIDAS), which took effect on 1 July 2016, an electronic signature creation device is software or hardware...

Read More
Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

5 min read

Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...

Read More
Diagram that shows how to integrate an eIDAS Qualified Remote Signing solution with other business systems

3 min read

How to Integrate eIDAS Qualified Remote Signing Tools with Your Systems

The demand for remote digital signatures to enhance security and customer experience continues to grow across the EU, as the banking and financial...

Read More
When Will Quantum Computing Arrive and How Will It Impact Cybersecurity?

4 min read

What is Quantum Computing And How Will It Impact Cybersecurity?

For years, there has been persistent chatter that quantum computing is coming and that organizations should be prepared for its arrival. But what...

Read More
Crypto-Agility in the Advent of Post Quantum Computing

5 min read

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...

Read More
Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

3 min read

Examining the NIST's Post-Quantum Cryptography Standardization Process

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...

Read More
Manage, Handle and Control Your Own Key in the MS Azure Key Vault

3 min read

Manage, Handle and Control Your Own Key in the MS Azure Key Vault

Microsoft’s Azure Key Vault Managed HSM allows customers to safeguard their cryptographic keys for their cloud applications and be...

Read More