encryption

White-Box Encryption: Ending Web App Vulnerability

Key management must give way to new options that enable and protect true encryption for organizations For as long as they’ve existed, web applications have been a favorite target for hackers. They ...
Security Boulevard

Modernizing Your PKI Infrastructure | Keyfactor 

Over the years, the definition, functionality, and team required to operate a modern PKI infrastructure has drastically changed ...

1 Billion Reasons to Manage Cryptographic Keys | Keyfactor

Postbank, the banking division of South Africa’s Pat Office, recently reported that a rogue employee had stolen the 36-digit master keys used to protect the banks systems. The result: 25,000 fraudulent charges ...
Graphic representing encryption keys that need to be managed to improve security

12 Enterprise Encryption Key Management Best Practices

From centralization to automation, here’s your 12-step guide to being more proactive with your enterprise’s encryption key management “What’s the first thing I need to protect data stored on our... The post ...
Understanding Key Management Policy – Part 2

Understanding Key Management Policy – Part 2

In the first part of this two-part series on Key Management, we saw how an increasing number of organizations are encrypting their sensitive data to mitigate cybersecurity risks. As covered earlier, with ...
Thales Cloud Protection and Licensing Intro Video

A New Leader in Data Protection

It’s been an exciting week for everyone at Thales and Gemalto. The combination of our two companies creates the worldwide leader in digital security, protecting more data, transactions and identities than any ...
Kapalya Partners with Gemalto to Leverage Their Latest Key Management Solution

Kapalya Partners with Gemalto to Leverage Their Latest Key Management Solution

Discover why Kapalya recently selected SafeNet Virtual KeySecure k170v — Gemalto’s next-generation key management solution — to provide centralized key management and improved administration, while helping customers to meet compliance ...

Unearthing Ransomware Characteristics Using Classification Taxonomy

We are familiar with the problem of ransomware – malicious software that seeks to encrypt user data and demand a ransom in return for the decryption key. There are several defensive measures ...
key management

The Importance of Key Management When Implementing a Secure Information Gateway

With the rise of new technologies, such as mobility, cloud, and virtualization, enterprises need to adopt encryption to keep sensitive data secure, especially the data stored on-premise. In this blog, we emphasize ...
That’s Right, We are Playing Both Sides of the Key Management Game

That’s Right, We are Playing Both Sides of the Key Management Game:

| | key management
Thales both giveth and taketh Bring Your Own Keys (BYOK) There is no longer denying that encryption is a hot... The post That’s Right, We are Playing Both Sides of the Key ...