Terry Anton (guest)

Terry Anton (guest)

Terry Anton is an experienced IT professional, entrepreneur, and author. Through more than 25 years of experience in the IT industry, he has witnessed the great evolution of technology into the modern age. With professional experience ranging from large government sector contracts to tech startups, he is able to bring a broad perspective to bear on just about any topic.
Steps to reach crypto agility to get prepared for quantum computing

Steps to reach crypto agility to get prepared for quantum computing

As the scientific community continues to push towards achieving quantum computing on a mass scale, smart companies are busy making preparations for this inevitability. While scientists disagree on whether it's 5 years away or 20 (or more), the reality is that the amount of time that organizations have to prepare is quickly slipping away. These preparations go far beyond just planning for new infrastructure investments. This is especially true for the utilization of encryption and crypto keys. Whether you are just beginning to plan for the quantum future or are well down the path, here are three important steps that will help you achieve crypto-agility and prepare yourself for quantum computing.

The link between HSMs and a Centralized Key Management System

The link between HSMs and a Centralized Key Management System

Managing cryptographic relationships and crypto key lifecycles can be challenging even in small scale environments. For those CISOs and IT Security Professionals that live in the world of international crypto architectures, such as those found in banking and finance, the list of barriers to success can become overwhelming.

The need to manage both symmetric and asymmetric keys

The need to manage both symmetric and asymmetric keys

The use of both symmetric and asymmetric cryptography & keys are part of a well-rounded solution for securing digital transactions. Each approach to protecting data has its benefits, especially when applied to the appropriate scenarios. Here we look at the reasons for using each cryptographic method.

What is Quantum Computing and how does it relate to today’s Cryptography Infrastructure Investments

What is Quantum Computing and how does it relate to today’s Cryptography Infrastructure Investments

The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating infrastructure expansion and upgrades. Quantum computing is still being developed but gets closer to reality every day. Here we look at the high level impacts of quantum computing in relation to cryptographic infrastructure.

The Advantages of Automated Key Management

The Advantages of Automated Key Management

The use of cryptography is the foundation for secure processing of financial and other electronic transactions. The management of the associated cryptographic keys, on the other hand, has been equally effective at stressing the capabilities of your people, processes, and systems. With that in mind, here are three advantages that automated key management will give you and your organization.

Distributed vs Centralized Key Management

Distributed vs Centralized Key Management

The need for mitigating risk with an appropriate key management system (KMS) is critical to the success of any organization that shares sensitive data across networks.

Here is a breakdown of two common types of KMSs and how risk mitigation can be successfully accomplished.

Differentiating between managing the lifecycle of cryptographic keys, protecting the keys and using the keys

Differentiating between managing the lifecycle of cryptographic keys, protecting the keys and using the keys

The modern world of cybersecurity can be a confusing place. There are tomes of data, regulations, and mandates in addition to the complex technical aspects. This is especially true when it comes to crypto key management systems (KMSs).