key management
The Security Imperative: Data Protection
As cyberthreats to supply chain, infrastructure and operational technology (OT)—not to mention rogue activity sponsored by nation-states—continue to increase, there is one constant: Good data protection has never been more critical. Successful ...
Overcoming the Challenges of Enterprise Key Management
Let’s face it: Encryption key management can seem daunting. Sure, it’s easy to connect a hardware security module (HSM) to a database and generate a key, but that’s not how it works ...
Enterprise Data Encryption Use Reaches Historic Highs
For decades, enterprise data encryption and effective key management were something most enterprises wanted to do but couldn’t — if they tried to do it at all. Only the largest of enterprises ...
Securing SSH Keys in Multicloud Operations
Secure Shell, or SSH, keys have become a go-to authentication tool, especially as we continue to adopt and adapt to distributed IT and remote working environments that demand robust access controls. But ...
White-Box Encryption: Ending Web App Vulnerability
Key management must give way to new options that enable and protect true encryption for organizations For as long as they’ve existed, web applications have been a favorite target for hackers. They ...
Modernizing Your PKI Infrastructure | Keyfactor
Over the years, the definition, functionality, and team required to operate a modern PKI infrastructure has drastically changed ...
1 Billion Reasons to Manage Cryptographic Keys | Keyfactor
Postbank, the banking division of South Africa’s Pat Office, recently reported that a rogue employee had stolen the 36-digit master keys used to protect the banks systems. The result: 25,000 fraudulent charges ...
12 Enterprise Encryption Key Management Best Practices
From centralization to automation, here’s your 12-step guide to being more proactive with your enterprise’s encryption key management “What’s the first thing I need to protect data stored on our... The post ...
Understanding Key Management Policy – Part 2
In the first part of this two-part series on Key Management, we saw how an increasing number of organizations are encrypting their sensitive data to mitigate cybersecurity risks. As covered earlier, with ...
A New Leader in Data Protection
It’s been an exciting week for everyone at Thales and Gemalto. The combination of our two companies creates the worldwide leader in digital security, protecting more data, transactions and identities than any ...