The need for Key Management beyond storage is effectively the need to provide security controls that reduce risk when authority is separated from responsibility. The published leak of National Geospatial Agency data onto Amazon S3 by a defense contractor shines a spotlight on both the problem and the solution. Read more
The Critical Need for Key Management Beyond Storage
/in Articles /by Chuck WhiteThe need for Key Management beyond storage is effectively the need to provide security controls that reduce risk when authority is separated from responsibility. The published leak of National Geospatial Agency data onto Amazon S3 by a defense contractor shines a spotlight on both the problem and the solution. Read more
A Primer on FIPS 140-2 Certifications
/in Articles /by Kevin MooneyLast week I spent my time attending the International Cryptographic Module Conference outside of Washington D.C. A recurring topic of interest to those in attendance was FIPS 140-2. There were a lot of questions around the topic, so I thought it beneficial to explain the basics of FIPS 140-2 certifications. Read more