In your position as the CISO, it is your responsibility to regulate and to ensure the security of the encryption environment within your organization. Since new threats arise day by day and most of our communication and transactions are done online, it is high time you do something in order to safeguard your encrypted dataContinue reading “A CISO’s Guide to Securing Encryption Environment”
Tag Archives: Cryptographic keys
How to seamlessly convert PFX encoded certificate file to PEM format using OpenSSL?
What is PKCS #12? PKCS #12 is an archive file format used for storing multiple cryptography objects in a single file. The filename extension for PKCS #12 files is .p12 or .pfx. This format is often used to bundle a PEM certificate and its corresponding private key, along with any additional CA chain certificates. What is aContinue reading “How to seamlessly convert PFX encoded certificate file to PEM format using OpenSSL?”
Does your organization have an Encryption Backdoor?
An encryption backdoor is a method of bypassing authentication and accessing encrypted data
Google Cloud Security- Key Management Services
In this article, we will take a closer look at Google’s Cloud Key Management Services. When users store data into Google Cloud, the data is automatically encrypted at rest. We use Google’s Cloud Key Management service to gain better control over managing the encrypted data-at-rest and encryption keys. Source and Control of cryptographic keys CloudContinue reading “Google Cloud Security- Key Management Services”
Key Management – Recommendations and Best Practices
Cryptographic keys are a vital part of any security system. They do everything from data encryption and decryption to user authentication. The compromise of any cryptographic key could lead to the collapse of an organization’s entire security infrastructure, allowing the attacker to decrypt sensitive data, authenticate themselves as privileged users, or give themselves access toContinue reading “Key Management – Recommendations and Best Practices”
Cloud-Based VS On-Premises HSMs
Introduction The adoption of Public Key Infrastructure (PKI) has been going up steadily in enterprises across industry sectors and has been described in earlier articles1 . PKI mechanisms such as certificate-based authentication, encrypted communication, certificate management, code signing, and others all combine to ensure a secure enterprise. However, all the security benefits offered by PKIContinue reading “Cloud-Based VS On-Premises HSMs”