Deconstructing Distributed Security: Centralized Management in a Distributed System

Cost and risk reductions in managing a distributed system provide the greatest benefits of centralized management. Securing these systems is made easier by a reduction in complexity as well as being highly focused and visible, as are support functions and overall storage aspects.

What the CISO Should Know About Protecting Encryption Keys In Cloud Environments

For decades, encryption key management provided by hardware security modules (HSM) has been the foundation for data security, but as companies move to the cloud they often find the HSM on-premises data encryption model does not efficiently serve the needs of protecting encryption keys in cloud environments. As enterprises contend with security threats CISOs are looking for simpler, standardized methods of securing data.

Distributed Data Security: Starting the Discussion

The benefits of distributed cloud computing are accompanied by new responsibilities for ensuring data is securely maintained wherever it resides—on-premises or in the cloud. One reality of cloud computing is the number of different cloud providers the typical enterprise employs to support its application and data needs. A growing percentage of enterprises have a multicloud strategy. Many even report running applications on an average of 3.4 public and private clouds and experimenting with 1.5 more for a total of 4.9 clouds. Multicloud enterprises are the norm.

How To Handle Key Management in Multicloud Environments

Cloud architects, who are often the nexus for critical decisions regarding data, applications, services and security, need to work closely with participants in any cloud project to determine the optimum key management strategy. This decision will be particularly important as an enterprise evolves its IT resources from an on-premises model to a widely distributed, multicloud model. A brief review of cloud evolution and the possible encryption key strategies that can be employed to highlight the pros and cons of various approaches.

Blockchain x Interconnection = Hot Tech!

Hailed as one of the key drivers of the fourth industrial revolution, blockchain technology is poised to introduce massive disruption to businesses across Asia-Pacific and around the world. There are potential applications in every industry, including the finance, insurance, logistics and election infrastructure, which we will look into in this blog.

Is Your HSM Strategy Optimal?

The growth of digital services provided by banks, card issuers, as well as an increasing number of fintech startups who are redefining payment methods and convenience is accompanied by an ever-greater vigilance regarding payment security. Hardly a week goes by without a news item mentioning a data breach that disrupts commerce, damages a business’s reputation and makes consumers less trusting of digital commerce.

Encryption Key Management for Retail: Using a SaaS Approach

Decades-old major retailers with significant investments in on-premises data centers typically take a cautious, gradual approach in making the transition. In most instances, the retailer opts for a hybrid cloud environment with data and applications distributed among their data center and a public or private cloud.

Cloud Applications should take a SaaS Approach to Encryption Key Management

Encryption key management is the foundation for data security. However, the well-established methods of managing encryption keys using legacy hardware security modules (HSM) are inadequate for the growing number of applications hosted in the cloud.

Decentralized Identifiers: Putting You in Charge of Your Identity

Most of the discussion about identity in the media and on the internet recently has been quite negative, focusing on violations of your privacy and the misuse of personal information tied to your identity. On more than one occasion, we have seen an identity management database compromised, which allows the identity details for millions of users to be obtained by darknet participants or state-sponsored cyberhackers.

Efficient Encryption Key Management for Blockchain Applications

Nearly every industry is investigating potential applications of distributed ledger technology (DLT), also known by the more popular term—blockchain. According to the Deloitte 2018 Global Blockchain Survey 74 percent of organizations responding to the survey recognize a “compelling business case” for blockchain applications.