7 min read
Exploring the Lifecycle of a Cryptographic Key
This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength...
7 min read
This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength...
2 min read
The need for mitigating risk with an appropriate key management system (KMS) is critical to the success of any organization that shares sensitive...
4 min read
The aim of this article is inform you on how to implement proper key management and to answer 3 important questions regarding centralized and...
2 min read
I once consulted a bank about their painstakingly slow cryptography and security processing system. After a week of searching, I examined the...
5 min read
In this final part of the series, we look at how cloud computing will impact the use of cryptography and at the future of HSMs; and finally, we...
5 min read
As part 2 of this 3-part series, here we look at new applications such as blockchain and IoT, as well as the impact of quantum technology.
4 min read
Cryptography has come a long way since ancient times, and the pace of development has been especially quick over the last 2 decades. Indeed, many...
3 min read
According to draft guidance published by NIST on July 19, 2018, the Triple Data Encryption Algorithm (TDEA) or 3DES is officially being retired. The...
2 min read
The Payment Card Industry Data Security Standard (PCI DSS) helps to safeguard cardholders’ private information. The Payment Card Industry Security...