You may have heard the term “mutual authentication” tossed around in reference to IT infrastructures or data security. You know you need mutual authentication, but do you know what it really is or what it does? If you don’t, no need to worry. We’ve broken mutual authentication down into an easy-to-understand overview.Read More
Certificates are used daily in the world of information security for transactions that vary from checking e-mail to validating electronic payments to transmitting healthcare records. When properly used, they are an effective way to verify credentials. And just as the process of issuing certificates must be tracked using an auditable method, the same is true for certificates that need to be revoked. For this, Certificate Revocation Lists (CRLs) are used.Read More
You may be familiar with the Internet of Things, AKA the rapidly growing network of smart devices that are capable of connecting to the internet. From watches to refrigerators to vehicles, virtually any machine can now be made with integrated internet capabilities. Network connections significantly increase the ease with which your devices are managed, monitored, and used on a daily basis. But with the convenience of using your device to access the internet comes to the risk that someone... Read More
To some, PKCS #11 may be a common term used on a daily basis, but to others, it’s unfamiliar jargon. Whether you’re a tech guru or not, PKCS #11 is a beneficial technology that you can implement into your organization’s IT infrastructure.What Is It?
PKCS #11 (Public-Key Cryptographic Standard #11) is a standard originally developed by RSA Laboratories and currently maintained by OASIS. PKCS #11 specifies a standardized API in the C programming language that offers substantial benefits... Read More
For any organization managing encryption keys, the process of creating, maintaining, and improving a key management system can seem a frustrating or even impossible task. These feelings of frustration often stem from a few prominent mistakes that frequently occur. Beyond simple annoyance with an inefficient system, key management mistakes can have a far more damaging effect: data breaches. Fortunately, these mistakes are easily preventable with some instruction. In our whitepaper, Ten Key Management Mistakes…And How to Avoid Them, we discuss ten actions that can make or break a key management system. This blog post covers the final mistake in the whitepaper.Read More