What Do Companies Perceive as the Most Important Encryption Features?

The need for certain encryption technology features can vary from company to company, depending on their individual needs for securing their data. The recent Ponemon Institute survey, Global Encryption Trends Study, showed that some encryption features are considered more essential than others when considering an encryption solution, especially for strong key management purposes.

Read more

Retail Banking after COVID-19: How Agile Cryptography Streamlines Self-Disruption

This article discusses the need for retail banks to continue moving forward with their digital transformation in the age of COVID-19 and explains why cryptography (when done right) can be a key enabler of a successful self-disruption process.

Read more

Q&A on Quantum Computing and Cryptography: The Risks Posed and how Crypto-Agility can Help Prepare for it

While the science and technology behind quantum computers is extremely complex, their computing power has been steadily increasing, from 3 qubits in 1998, to 7 qubits in 2000, to 12 qubits in 2006, and up to 72 qubits in 2018.

Read more

The SHA-1 Attack Further Emphasizes the Need for Crypto-Agility 

The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is a Shambles”.  

Read more

SHA-1 is Practical and Cost-Effective to Crack Now

This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.

Read more

The Need for a Crypto Abstraction Layer: Utilizing HSMs with Greater Efficiency and Agility

With increasingly tough security and privacy regulations, the use of cryptography is exploding in the modern enterprise. Hardware security modules (HSMs) provide the highest standard of security and compliance, but they are difficult to use and often deployed in silos, complicating compliance and hindering crypto-agility. As competitive pressures intensify, how can cryptography be turned into an enabler of business agility and digital transformation?

Read more

Symmetric Encryption Algorithms - Their Strengths and Weaknesses, and the Need for Crypto-Agility

In this article, the second in a 3-part series on symmetric key encryption technology, we look at the development of symmetric key encryption algorithms and the range of algorithms available today along with their strengths and weaknesses, as well as the importance of crypto-agility.

Read more

Steps to reach crypto agility to get prepared for quantum computing

As the scientific community continues to push towards achieving quantum computing on a mass scale, smart companies are busy making preparations for this inevitability. While scientists disagree on whether its 5 years away or 20 (or more), the reality is that the amount of time that organizations have to prepare is quickly slipping away. These preparations go far beyond just planning for new infrastructure investments. This is especially true when it comes to the use of cryptography and crypto keys. Whether you are just beginning to plan for the quantum future or are well down the path, here are three important steps that will help you achieve crypto-agility and prepare yourself for quantum computing.

Read more

Achieving Agile Cryptography Management with Crypto Service Gateway (CSG)

CSG helps you realize business-agile and efficient crypto services, with central control of security policy and crypto hardware. In this article, we will look at some of the uses cases that address common crypto headaches whilst generating a strong return on investment.

Read more