4 Things Leaders Need to Know About the IoT

The Internet of Things (IoT) is a network of physical objects, such as smart appliances, car navigators, drones, etc. that can communicate, interact and exchange data over the internet. One of the earliest examples of the IoT was a connected Coca Cola machine on the Carnegie Mellon University campus in the early 1980s. Local programmers were able to connect to the machine by the internet to see if a cold drink was available before making the trip

Encryption Key Management Best Practices

Data encryption is the bedrock of cybersecurity. Encrypted data remains worthless ciphertext without access to encryption keys; hardware security modules (HSM) are well-established means for securing those keys in on-premises data centers. Data security teams are well-versed in the process of purchasing, provisioning and managing those HSMs.

Improve Cloud Security Management with a Cloud-Based HSM

When we talk to companies around the world, a common topic of discussion is the transformational nature of cloud technologies. In a very short time, the cloud has disrupted every aspect of how IT infrastructure, resources and software are deployed and managed. While there’s near-universal agreement on the economic benefits of this, it’s not all good news: In these discussions, the conversation invariably turns toward the growing challenges of cloud security management - in particular, the management of the encryption keys that are fundamental to cloud security.

Hardware Security Module (HSM) vs. Key Management Service (KMS)

The cloud strategy you adopt—private, hybrid, public or multicloud—is a key factor in the decision as to which encryption key management strategy will work best for your enterprise. For best results, your key strategy should fit your long-term cloud strategy and should be applied consistently across your enterprise.

Fulfill GDPR Personal Data Requirements with HSM as a Service

The best approach to delivering each of the aforementioned capabilities is an HSM as a Service (HSMaaS) solution. It leverages the established strengths of the cloud—wide availability, service on demand and scalability—to make encryption keys easy to implement and manage.

5 Things We Learned From Our Customers About Multicloud Security

You learn a lot from your customers, especially how they use your products and what they find useful. At least that is what we experienced during our Equinix SmartKey public beta trial with dozens of enterprise and service provider participants.