4 min read
The Use of Random Number Generators in Cryptography
In this article, we examine the use of random number generators (RNGs) in cryptography, specifically in relation to hardware security modules (HSMs)...
4 min read
In this article, we examine the use of random number generators (RNGs) in cryptography, specifically in relation to hardware security modules (HSMs)...
4 min read
The aim of this article is inform you on how to implement proper key management and to answer 3 important questions regarding centralized and...
2 min read
I once consulted a bank about their painstakingly slow cryptography and security processing system. After a week of searching, I examined the...
3 min read
Crypto-agility, or cryptographic agility, is the capacity for an information security system to adopt an alternative to the original encryption...
2 min read
The Payment Card Industry Data Security Standard (PCI DSS) helps to safeguard cardholders’ private information. The Payment Card Industry Security...
3 min read
Appropriate management of cryptographic keys is essential for the application of cryptography. This is often aided by the use of a hardware security...
3 min read
Part 1 – Increasing Efficiency & Resilience This two-part article discusses how cryptography is employed within organizations today and examines some...
3 min read
Recent revelations in the press have caused industry experts to question just how much trust can be placed in existing cryptographic standards or...