In this final part of the series, we look at how cloud computing will impact the use of cryptography and at the future of HSMs; and finally, we reflect on what you can do to be ready for the advances in cryptography that lie ahead.Read more
A cryptographic zone exists between two points, where a symmetric key or asymmetric public keys are shared in order to encrypt sensitive information. Once the key, or keys have been exchanged, data, and in some cases other keys, are encrypted within this zone.
This article discusses key management strategies for the SaaS cloud model, and unique security problems to be dealt with because of lack of user control.Read more
This article discusses key management methods for the IaaS Cloud model, and security problems to be dealt with because of its virtualization structure.Read more