James H. Reinholm (guest)

James H. Reinholm is an American scientist and author in the fields of Information Technology. In recent time he has been focusing on miniaturized devices with wireless capability. James holds a Masters Degree in Electrical Engineering by the University of Michigan.

Methods_of_maximizing_the_security_protection_of_a_cryptographic_system.jpg

5 min read

Maximizing Payment Card Industry (PCI) & Cryptographic System Security

This article talks about how different factors and controls can affect the strength and effectiveness of a cryptographic system's security. It gives...

Read More

4 min read

Encryption Key Management Challenges for IaaS in the Cloud

This article discusses key management methods for the IaaS Cloud model, and security problems to be dealt with because of its virtualization...

Read More

3 min read

How to Simplify Key Management System Compliance Audits

This article explains some of the cryptographic key management tasks involved in demonstrating and proving compliance to acceptable standards, and...

Read More

4 min read

Cryptographic Key Management Policy: a layered approach

This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...

Read More
Reducing_Payment_Credit_Card_Fraud_By_Shifting_to_EMV_technology.jpg

10 min read

Reducing Payment Card Fraud by Shifting over to EMV Chip Technology

This article gives an insight into the EMV chip technology, which is being rolled out on a world-wide scale to increase the level of fraud protection...

Read More

6 min read

Enhancing Payment Card Security By Integrating PCI with EMV Technology

This article discusses how the security protection of payment card data used in a transaction can be maximized by integrating PCI DSS with EMV...

Read More
Ensuring_the_survivability_of_a_cryptographic_system.jpg

3 min read

Ensuring the Survivability of a Cryptographic System

This article discusses methods of restoring secure systems, such as payment card processing, to normal cryptographic operation after an attack or...

Read More

3 min read

Key Management Considerations For Creating a Domain Security Policy

This article discusses the necessary exchange of information between entities within a security domain and other entities outside of the security...

Read More

6 min read

Key Management: Explaining the Life Cycles of a Cryptographic Key

This paper discusses the various phases in the life cycle of a cryptographic key, and how the operational life-time and key strength can be...

Read More