Securing the Unsecurable in Interconnected Digital Technology: Part I – Interconnection Oriented Architecture

Advances in the use of digital technology have improved customer experiences in most industries. Look around—there isn’t a day that we’re not benefitting, as individuals and as a society, from recent advances in digital technology, whether by using an innovative application or by discovering a disruptive digital service capable of transforming some aspect of our daily routine.

How Secure is Amazon’s Key Management Service (AWS KMS)?

AWS CloudHSM is designed for organizations that formerly used HSMs to manage encryption keys in their own data centers and would like to continue in the same vein by using HSMs provided and maintained by AWS. With CloudHSM, HSMs purchased, provisioned and managed by an organization within their own data centers are replaced by HSMs purchased, provisioned and managed by Amazon.