
New Publication From the Cloud Security Alliance (CSA): Hardware Security Modules as a Service
I’ve been part of the Cloud Security Alliance (CSA) Cloud Key Management working group for... The post New Publication From the Cloud Security Alliance (CSA): Hardware Security Modules as a Service appeared first on Entrust Blog ... Read More

NSA Announces Update to Commercial National Security Algorithm Suite 2.0 and Quantum Computing FAQ
In October 2022, Entrust published the article, NSA Announces New Post-Quantum Resistant Algorithm Suite 2.0... The post NSA Announces Update to Commercial National Security Algorithm Suite 2.0 and Quantum Computing FAQ appeared first on Entrust Blog ... Read More

External Key Storage for AWS cloud using nShield HSMs
On November 29, 2022, AWS announced the eXternal Key Store (XKS) capability for AWS Key... The post External Key Storage for AWS cloud using nShield HSMs appeared first on Entrust Blog ... Read More
Everything You Need to Know About 5G Security
It’s no secret that the arrival of 5G technology will usher in a new wave... The post Everything You Need to Know About 5G Security appeared first on Entrust Blog ... Read More
The data protection puzzle piece for telecoms
The telecom and communications industry is undergoing unprecedented change. The ever-growing demand for higher connections... The post The data protection puzzle piece for telecoms appeared first on Entrust Blog ... Read More

Post-Quantum Cryptography Advances…Under the Hood
A typical scene at a car enthusiasts motorhead event involves souped-up cars with their hoods... The post Post-Quantum Cryptography Advances…Under the Hood appeared first on Entrust Blog ... Read More

Ownership, Control, and Possession – A New AWS Feature for Key Management with the Cloud
I blogged last year about ownership, control, and possession in relation to high-value cryptographic keys,... The post Ownership, Control, and Possession – A New AWS Feature for Key Management with the Cloud appeared first on Entrust Blog ... Read More

Defensive Weapons in Containerized Environments
The oldest known example of hardened and tempered metal was a pick-axe found in Galilee... The post Defensive Weapons in Containerized Environments appeared first on Entrust Blog ... Read More

Retaining Customer Control in a Multi-Cloud Environment
In a recent blog I covered the Cloud Security Alliance (CSA) publication: Top Threats to Cloud Computing... The post Retaining Customer Control in a Multi-Cloud Environment appeared first on Entrust Blog ... Read More

NSA announces new Post-Quantum resistant algorithm Suite 2.0 and Transition Timetable
Recently the National Security Agency (NSA) provided an update on its security posture with regards... The post NSA announces new Post-Quantum resistant algorithm Suite 2.0 and Transition Timetable appeared first on Entrust Blog ... Read More