How to Deploy and Manage Cryptography in a Project the Right Way

With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use cryptography to prevent sensitive information from cyber attackers.

Read more

What is the right user interface for a Key Management System?

User interface design and usability are the deciding factors in attaining a good user experience for most IT deployments, including key management systems (KMS). The most significant constraint to the use of a KMS is the difficulty that some systems present to the non-specialist users.

User interfaces (UIs) that adapt to the expertise of the user can guide a new and less-trained user, while permitting an expert to use efficient shortcuts and to bypass step-by-step guidance.

This article presents high level recommendations on efficient user interface design for a key management system.

Read more

How Third Party Testing Can Improve Key Management System Security

Independent third-party testing is essential for identification, detection, and elimination of defects in a key management system (KMS). The third-party testing organizations often have specialized facilities and expertise to carry out the testing and offer unbiased testing reports. These testing and validation activities should be performed on each module including the security functions and the protective measures employed by each module. This article discusses the benefits of third party testing for a key management system.

Read more

Methods of Maximizing the Security Protection of a Cryptographic System relating to the Payment Card Industry (PCI)

This article discusses how various factors and related controls can affect the effectiveness and strength of the security protection for a cryptographic system.

It gives particular consideration to the requirements of the Payment Card Industry (PCI)

Read more

Expert’s Guidelines on how to document a Key Management System

This article discusses the importance and usage of documentation for a key management system within an organization.

Read more

Server and Device Hardening Recommendations for Key Management Systems

This article discusses the procedures and techniques used in key management system hardening for servers and devices. 

Read more

Classification of Cryptographic Keys (Functions & Properties)

This article describes the functions and properties of the various cryptographic key types used for securing digital communications. Recommended crypto-periods are also discussed.

Read more

Cryptographic Key Management Policy: a layered approach

 

This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy layers interact.

Read more

7 Tips for Correct Usage of Encryption to Secure eGovernment Processes

Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last few years have seen an increase in hacking and exposure of confidential data to individuals or cyber criminals. Lack of data protection or data encryption has been one of the major reasons behind such security breaches.

Recently, a healthcare industry data breach occurred because the company stored Social Security Numbers of 80 million customers without encrypting them. The subsequent paragraphs suggest a set of best practices that can help to improve the level of cyber security in eGovernment transactions.

Read more