3 min read
AWS External Key Store: Crypto Gateway Integration
AWS Key Management Service (KMS) has long provided cryptographic services to safeguard your AWS resources. This involves generating and managing keys...
 
                  
                
                3 min read
 Glen Leonhard:  22. June 2023
                    
                    Glen Leonhard:  22. June 2023
                  AWS Key Management Service (KMS) has long provided cryptographic services to safeguard your AWS resources. This involves generating and managing keys...
 
                  
                
                4 min read
 Glen Leonhard:  01. June 2023
                    
                    Glen Leonhard:  01. June 2023
                  When organizations make the strategic decision to shift their applications and infrastructure onto the cloud, they face a myriad of challenges. These...
 
                  
                
                3 min read
When it comes to preparing for post-quantum computing, the legacy mechanisms for effective implementation, integration, and management of...
 
                  
                
                3 min read
This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current...
 
                  
                
                5 min read
 Edlyn Teske:  29. October 2022
                    
                    Edlyn Teske:  29. October 2022
                  Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.
 
                  
                
                3 min read
With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...
 
                  
                
                3 min read
 Edlyn Teske:  22. July 2022
                    
                    Edlyn Teske:  22. July 2022
                  An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of...
 
                  
                
                4 min read
 Edlyn Teske:  26. March 2022
                    
                    Edlyn Teske:  26. March 2022
                  Last month, one of the three NIST finalists for post-quantum signature schemes received its final nail in the coffin: Ward Beullens, a PostDoc at IBM...
 
                  
                
                2 min read
Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...