Blog

What is Code Signing?

What is Code Signing?

by Futurex on November 23rd, 2020

When downloading software from the Internet, consumers must always be wary of third parties masquerading as the developer of the software. With a resource like code signing, users can be assured the software they are downloading is from a safe source. Code signing is an operation where a software developer or distributor digitally signs the file being sent out, to assure users that they are receiving software that does what the creator says it will. The signature also acts as proof the code has not been tampered with or modified from its original form.

Join Encryption Consulting and Futurex for a webinar on December 9, where will discuss the potential ramifications of such attacks, how they can be mitigated, and how organizations can evolve existing code signing islands into a secure, well-defined process. Register for All You Need to Know About Enterprise Code Signing now.

Read More
Controlling the Encryption Keys

Controlling the Encryption Keys

by Futurex on November 10th, 2020

As enterprises move greater volumes of their computing workloads to public clouds, the issue of encryption key management is increasing in importance. The vital question isn’t just “is my data on the cloud encrypted?” It is “is my data on the cloud encrypted AND do I control the encryption keys?”

Together with Encryption Consulting, we answer these questions in the webinar, What You Need to Know About Multi-Cloud Key Management. Listen to the on-demand recording now.

Read More
An Introduction to BYOK and the Futurex KMES Series 3 HSM

An Introduction to BYOK and the Futurex KMES Series 3 HSM

by Futurex on October 22nd, 2020

— Riley Dickens, consultant, Encryption Consulting

More and more organizations are moving their cyber operations onto the cloud every day due to the flexibility, scalability, and cheaper cost provided by Cloud Service Providers (CSPs). Due to this migration to the cloud, cybersecurity is an even larger component of any organization’s infrastructure. This increase in cybersecurity necessitates the creation of new methods of managing security components, such as the use of Bring Your Own Key (BYOK) solutions or Hardware Security Modules (HSMs), such as Futurex’s KMES Series 3 HSM.

Read More
123