External Key Storage for AWS cloud using nShield HSMs
On November 29, 2022, AWS announced the eXternal Key Store (XKS) capability for AWS Key... The post External Key Storage for AWS cloud using nShield HSMs appeared first on Entrust Blog ... Read More
Everything You Need to Know About 5G Security
It’s no secret that the arrival of 5G technology will usher in a new wave... The post Everything You Need to Know About 5G Security appeared first on Entrust Blog ... Read More
The data protection puzzle piece for telecoms
The telecom and communications industry is undergoing unprecedented change. The ever-growing demand for higher connections... The post The data protection puzzle piece for telecoms appeared first on Entrust Blog ... Read More
Post-Quantum Cryptography Advances…Under the Hood
A typical scene at a car enthusiasts motorhead event involves souped-up cars with their hoods... The post Post-Quantum Cryptography Advances…Under the Hood appeared first on Entrust Blog ... Read More
Ownership, Control, and Possession – A New AWS Feature for Key Management with the Cloud
I blogged last year about ownership, control, and possession in relation to high-value cryptographic keys,... The post Ownership, Control, and Possession – A New AWS Feature for Key Management with the Cloud appeared first on Entrust Blog ... Read More
Defensive Weapons in Containerized Environments
The oldest known example of hardened and tempered metal was a pick-axe found in Galilee... The post Defensive Weapons in Containerized Environments appeared first on Entrust Blog ... Read More
Retaining Customer Control in a Multi-Cloud Environment
In a recent blog I covered the Cloud Security Alliance (CSA) publication: Top Threats to Cloud Computing... The post Retaining Customer Control in a Multi-Cloud Environment appeared first on Entrust Blog ... Read More
NSA announces new Post-Quantum resistant algorithm Suite 2.0 and Transition Timetable
Recently the National Security Agency (NSA) provided an update on its security posture with regards... The post NSA announces new Post-Quantum resistant algorithm Suite 2.0 and Transition Timetable appeared first on Entrust Blog ... Read More
Taking a holistic approach to tackling the Top Threats to Cloud Computing in a multi-cloud world
Can you remember the halcyon days of the video game arcades? This will probably date me, but I have fond... The post Taking a holistic approach to tackling the Top Threats to Cloud Computing in a multi-cloud world appeared first on Entrust Blog ... Read More
Like a zero-day attack but 30 years before it happens
The title of the blog are not my words but those of Canadian mathematician and renowned post-quantum academic Michele Mosca.... The post Like a zero-day attack but 30 years before it happens appeared first on Entrust Blog ... Read More