Securing Web applications with Cryptographic Zones

A cryptographic zone exists between two points, where a symmetric key or asymmetric public keys are shared in order to encrypt sensitive information. Once the key, or keys have been exchanged, data, and in some cases other keys, are encrypted within this zone.

Read more

Key Management Strategies for SaaS: Avoid the pitfalls in the Cloud


This article discusses key management strategies for the SaaS cloud model, and unique security problems to be dealt with because of lack of user control.

Read more

Encryption Key Management Challenges for IaaS in the Cloud


This article discusses key management methods for the IaaS Cloud model, and security problems to be dealt with because of its virtualization structure.

Read more