derived keys

NSA Announces Update to Commercial National Security Algorithm Suite 2.0 and Quantum Computing FAQ

| | zero trust
In September 2022, Entrust published the article, NSA Announces New Post-Quantum Resistant Algorithm Suite 2.0... The post NSA Announces Update to Commercial National Security Algorithm Suite 2.0 and Quantum Computing FAQ appeared first on Entrust Blog ... Read More
AWS Cloud

External Key Storage for AWS cloud using nShield HSMs

On November 29, 2022, AWS announced the eXternal Key Store (XKS) capability for AWS Key... The post External Key Storage for AWS cloud using nShield HSMs appeared first on Entrust Blog ... Read More

Everything You Need to Know About 5G Security

It’s no secret that the arrival of 5G technology will usher in a new wave... The post Everything You Need to Know About 5G Security appeared first on Entrust Blog ... Read More

The data protection puzzle piece for telecoms

The telecom and communications industry is undergoing unprecedented change. The ever-growing demand for higher connections... The post The data protection puzzle piece for telecoms appeared first on Entrust Blog ... Read More
NIST

Post-Quantum Cryptography Advances…Under the Hood

A typical scene at a car enthusiasts motorhead event involves souped-up cars with their hoods... The post Post-Quantum Cryptography Advances…Under the Hood appeared first on Entrust Blog ... Read More
AWS Key Management Service

Ownership, Control, and Possession – A New AWS Feature for Key Management with the Cloud

I blogged last year about ownership, control, and possession in relation to high-value cryptographic keys,... The post Ownership, Control, and Possession – A New AWS Feature for Key Management with the Cloud appeared first on Entrust Blog ... Read More
Container lifecycle process

Defensive Weapons in Containerized Environments

The oldest known example of hardened and tempered metal was a pick-axe found in Galilee... The post Defensive Weapons in Containerized Environments appeared first on Entrust Blog ... Read More
Recommendations for Using a Customer Controlled Key Store

Retaining Customer Control in a Multi-Cloud Environment

In a recent blog I covered the Cloud Security Alliance (CSA) publication: Top Threats to Cloud Computing... The post Retaining Customer Control in a Multi-Cloud Environment appeared first on Entrust Blog ... Read More
CNSA 2.0 Timeline

NSA announces new Post-Quantum resistant algorithm Suite 2.0 and Transition Timetable

Recently the National Security Agency (NSA) provided an update on its security posture with regards... The post NSA announces new Post-Quantum resistant algorithm Suite 2.0 and Transition Timetable appeared first on Entrust Blog ... Read More
Top Threats to Cloud Computing

Taking a holistic approach to tackling the Top Threats to Cloud Computing in a multi-cloud world

Can you remember the halcyon days of the video game arcades? This will probably date me, but I have fond... The post Taking a holistic approach to tackling the Top Threats to Cloud Computing in a multi-cloud world appeared first on Entrust Blog ... Read More
Loading...

Secure Coding Practices