Last week I spent my time attending the International Cryptographic Module Conference outside of Washington D.C. A recurring topic of interest to those in attendance was FIPS 140-2. There were a lot of questions around the topic, so I thought it beneficial to explain the basics of FIPS 140-2 certifications.
About Kevin Mooney
Kevin has been doing computer security work for more than 12 years in both the public and private sectors. His focus is in solutions architecture and technology integration. When he’s not designing IT solutions, Kevin enjoys crafting new cocktails, traveling to new countries, and playing video games with his wife.