Dawn M. Turner (guest)

Dawn M. Turner is a professional author with a passion for technical regulations and standards, as well as for their relevance and impact on corporate operations and industry in general. Dawn has more than 10 years of IT industry experience in hardware, programming & systems & network engineering. Her educational background includes a Certificate in computer operations & programming, CompTIA and Microsoft certifications, including A+, MCSE and MCP, Associates degree with major in business & minor in computer science, Bachelors of Science degree with major in business forensics & minor in accounting and an MBA with concentrations in finance & economics.

Payment & Banking Cryptography: An Overview of the Benefits of z/OS and the Z Platform

4 min read

Payment & Banking Cryptography: The Benefits of z/OS & the Z Platform

This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for...

Read More
Digital signature deployment models for banking - Operating as an eIDAS Compliant Registration Authority Reduces Costs and Preserves Customer Ownership

3 min read

How Digital Signature Deployment Models Optimise eIDAS Implementation

The eIDAS regulation provides both the technical and legal framework for electronic identification and digital signatures that the banking sector...

Read More
Common Key Management System Models for the Cloud

5 min read

Common Key Management System Models for the Cloud

This article explains the four primary cloud KMS pattern combinations and which are best suited for use with Cryptomathic’s Key Management System...

Read More
Understanding the Concepts of Bring Your Own Key

3 min read

Understanding the Concepts of Bring Your Own Key

Bring your own key (BYOK) is a popular term relating to key management for cloud applications. However, a lack of standardization makes it confusing...

Read More
Cryptomathic CKMS: Centralized & Automated Key Management for payShield HSMs

2 min read

Cryptomathic CKMS: Centralized, Automated Key Management for payShield

Banks and financial institutions must adhere to a rigorous set of security and regulatory practices to protect data, communications, and processes.

Read More
Choosing the right key-management-system across the hybrid cloud

3 min read

Selecting the Right Key Management System

The protection and secure management of cryptographic keys is crucial for ensuring that cryptography is used in the most effective way to keep data...

Read More
Air India's Massive Data Breach - Compliance to Major Rules of Data Security of More Important than Ever

4 min read

Air India's Data Breach - data security is more crucial than ever.

Recent global events have demonstrated that high-profile hackers and state-sponsored security breaches have been steadily increasing since 2020. It...

Read More
Misuse of X.509 Certificates & Keys Involved in SolarWinds Attack

3 min read

Misuse of X.509 Certificates & Keys Involved in SolarWinds Attack

This article discusses the misuse of X.509 certificates and keys in the SolarWinds attack and how Cryptomathic CKMS and CSG could help protect...

Read More

3 min read

Key Management Interoperability Protocol: Achievements and Challenges

The Key Management Interoperability Protocol standard intends to provide interoperability across various key management environments and hence to...

Read More