Dawn M. Turner (guest)

Dawn M. Turner is a professional author with a passion for technical regulations and standards, as well as for their relevance and impact on corporate operations and industry in general. Dawn has more than 10 years of IT industry experience in hardware, programming & systems & network engineering. Her educational background includes a Certificate in computer operations & programming, CompTIA and Microsoft certifications, including A+, MCSE and MCP, Associates degree with major in business & minor in computer science, Bachelors of Science degree with major in business forensics & minor in accounting and an MBA with concentrations in finance & economics.

3 min read

What is Key Management? a CISO Perspective

Key management refers to managing cryptographic keys within a cryptosystem. It is concerned with the generation, exchange, storage, use, and...

Read More
Close up of a traditional door key, a USB stick, and a PayPal card

3 min read

What is a Digital Signature? What it Does and How the process Works

In today's fast-paced business world, there is always a need to speed up various processes that are essential for optimising efficiency while still...

Read More

3 min read

Using 3D-Secure and Device Fingerprints for EMV Payments Against CNP Fraud

Credit cardholders are generally protected from liability if unauthorized transactions are made with their credit cards because of consumer...

Read More
Digital Authentication - the basics

5 min read

Digital Authentication - the basics

When it comes to conducting transactions, the possibility of fraud is always a risk that cannot be overlooked. In person, an individual may present...

Read More

3 min read

Applying Cryptographic Security Services - a NIST summary

This article summarizes the basic cryptographic security services described in NIST Special Publication 800-57 (1, rev.4) for Key Management that can...

Read More

4 min read

EMV and PCI DSS compliance: cryptography and key management requirements

EMV chips on payment cards contain cryptographic co-processors and dual interfaces that allow for contact and contactless payment options. When...

Read More
Strong authentication for Governments through trust service providers

3 min read

Trust Service Providers & Strong Authentication: Government Benefits

One of the greatest benefits of the digital age is the availability of being able to perform many different government processes online in a shorter...

Read More

3 min read

Understanding non-repudiation of origin and non-repudiation of emission

This article sheds light on the two approaches to achieve non-repudiation of an electronic message: non-repudiation of emission and non-repudiation...

Read More
ADES-STANDARD-FOR-MOBILE-and-DISTRIBUTED-ENVIRONMENTS.jpg

3 min read

Using The AdES Standard for Mobile and Distributed Environments

AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and...

Read More