Blog

Futurex to Answer Top 5 Payment Security Questions at ICMC20

Futurex to Answer Top 5 Payment Security Questions at ICMC20

by Futurex on August 27th, 2020

Tune in September 22 for The Art of Designing Crypto Infrastructure for Payments, presented by Adam Cason, Vice President, Global and Strategic Alliances at Futurex, at this year’s ICMC20 (International Cryptographic Module Conference). At this virtual event, Casen will address top crypto questions and best practices for payment security and financial encryption.

By registering & attending this session, attendees will learn how to self-assess their cryptographic infrastructure —designs, certification plans, and deployment architecture — implement new and battle-tested encryption techniques and best practices implemented by top financial services organizations for protecting some of the world’s most sensitive payment data. Register for ICMC20

Read More
How the Three Pillars of Crypto-Agility Prepare Your Enterprise for Whatever the Future Holds

How the Three Pillars of Crypto-Agility Prepare Your Enterprise for Whatever the Future Holds

by Futurex on August 19th, 2020

By Mike Cooper, Revocent

With the challenges only becoming more complex as certificate lifespans get shorter and shorter, there is only one path forward and that is to achieve crypto-agility. By crypto-agility we mean that your organization has taken complete control over cryptographic mechanisms – your public key infrastructure (PKI) and associated processes – and can quickly make whatever changes are needed without intense manual effort.

Read More
Quantum Technology is Closer Than You Think

Quantum Technology is Closer Than You Think

by Futurex on August 12th, 2020

The threat of quantum computers is the ability to break public key cryptography as we know it. Experts estimate that the large-scale quantum computers that are expected within the next five to seven years, will be capable of breaking most current public-key encryption algorithms such as RSA, ECC, and Diffie-Hellman, rendering them useless.

“It is critical to begin planning for the replacement of hardware, software, and services that use public-key algorithms now so that the information is protected from future attacks” -NIST

Read More