key management
White-Box Encryption: Ending Web App Vulnerability
Key management must give way to new options that enable and protect true encryption for organizations For as long as they’ve existed, web applications have been a favorite target for hackers. They ...
Modernizing Your PKI Infrastructure | Keyfactor
Over the years, the definition, functionality, and team required to operate a modern PKI infrastructure has drastically changed ...
1 Billion Reasons to Manage Cryptographic Keys | Keyfactor
Postbank, the banking division of South Africa’s Pat Office, recently reported that a rogue employee had stolen the 36-digit master keys used to protect the banks systems. The result: 25,000 fraudulent charges ...
12 Enterprise Encryption Key Management Best Practices
From centralization to automation, here’s your 12-step guide to being more proactive with your enterprise’s encryption key management “What’s the first thing I need to protect data stored on our... The post ...
Understanding Key Management Policy – Part 2
In the first part of this two-part series on Key Management, we saw how an increasing number of organizations are encrypting their sensitive data to mitigate cybersecurity risks. As covered earlier, with ...
A New Leader in Data Protection
It’s been an exciting week for everyone at Thales and Gemalto. The combination of our two companies creates the worldwide leader in digital security, protecting more data, transactions and identities than any ...
Kapalya Partners with Gemalto to Leverage Their Latest Key Management Solution
Discover why Kapalya recently selected SafeNet Virtual KeySecure k170v — Gemalto’s next-generation key management solution — to provide centralized key management and improved administration, while helping customers to meet compliance ...
Unearthing Ransomware Characteristics Using Classification Taxonomy
We are familiar with the problem of ransomware – malicious software that seeks to encrypt user data and demand a ransom in return for the decryption key. There are several defensive measures ...
The Importance of Key Management When Implementing a Secure Information Gateway
With the rise of new technologies, such as mobility, cloud, and virtualization, enterprises need to adopt encryption to keep sensitive data secure, especially the data stored on-premise. In this blog, we emphasize ...
That’s Right, We are Playing Both Sides of the Key Management Game:
Thales both giveth and taketh Bring Your Own Keys (BYOK) There is no longer denying that encryption is a hot... The post That’s Right, We are Playing Both Sides of the Key ...

