Recommendations for Using a Customer Controlled Key Store

Retaining Customer Control in a Multi-Cloud Environment

In a recent blog I covered the Cloud Security Alliance (CSA) publication: Top Threats to Cloud Computing... The post Retaining Customer Control in a Multi-Cloud Environment appeared first on Entrust Blog ... Read More
CNSA 2.0 Timeline

NSA announces new Post-Quantum resistant algorithm Suite 2.0 and Transition Timetable

Recently the National Security Agency (NSA) provided an update on its security posture with regards... The post NSA announces new Post-Quantum resistant algorithm Suite 2.0 and Transition Timetable appeared first on Entrust Blog ... Read More
Top Threats to Cloud Computing

Taking a holistic approach to tackling the Top Threats to Cloud Computing in a multi-cloud world

Can you remember the halcyon days of the video game arcades? This will probably date me, but I have fond... The post Taking a holistic approach to tackling the Top Threats to Cloud Computing in a multi-cloud world appeared first on Entrust Blog ... Read More

Like a zero-day attack but 30 years before it happens

The title of the blog are not my words but those of Canadian mathematician and renowned post-quantum academic Michele Mosca.... The post Like a zero-day attack but 30 years before it happens appeared first on Entrust Blog ... Read More
Key Ownership, Control, and Possession

Ownership, Control and Possession – Options for Key Management in the Cloud

My favourite scene from mid-80’s movie Ferris Bueller’s Day Off, was when Ferris (Matthew Broderick) and his friends roll into... The post Ownership, Control and Possession – Options for Key Management in the Cloud appeared first on Entrust Blog ... Read More
Key Ownership, Control, and Possession

Ownership, Control and Possession – Options for Key Management in the Cloud

My favourite scene from mid-80’s movie Ferris Bueller’s Day Off, was when Ferris (Matthew Broderick) and his friends roll into... The post Ownership, Control and Possession – Options for Key Management in the Cloud appeared first on Entrust Blog ... Read More

HSMs in the cloud – Rockin’ all over the world!

Who can recall the first pop/rock performance that played at the Live Aid concerts back in 1985? The first act... The post HSMs in the cloud – Rockin’ all over the world! appeared first on Entrust Blog ... Read More

HSMs in the cloud – Rockin’ all over the world!

Who can recall the first pop/rock performance that played at the Live Aid concerts back in 1985? The first act... The post HSMs in the cloud – Rockin’ all over the world! appeared first on Entrust Blog ... Read More

AES turns 20

“It was twenty years ago today” is the opening lyric to Sgt Pepper’s Lonely Hearts Club band, the seminal song... The post AES turns 20 appeared first on Entrust Blog ... Read More

Mitigating the NOBELIUM FoggyWeb threat with HSMs

Last week, Microsoft published news about FoggyWeb, another sophisticated persistent backdoor hack which is designed to steal credentials and compromise... The post Mitigating the NOBELIUM FoggyWeb threat with HSMs appeared first on Entrust Blog ... Read More