Remove Digital transformation Remove Encryption Remove InfoSec
article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

At the same time, we also have changes at every layer of the protocol stack and this is driven by an increased push for encryption—not just encryption, strong encryption.". We're responsible for the CIS benchmarks and the CIS controls.

InfoSec 97
article thumbnail

Risks to Your Network from Insecure Code Signing Processes

Security Boulevard

Plus, the practice of individually storing code signing keys results in an inscrutable and unsafe labyrinth of encryption keys, often referred to as key sprawl. Many InfoSec teams don’t have the visibility into what their software development teams are doing. In years past, InfoSec may have been the central keeper of code signing.

Risk 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: RSA CTO Zulfikar Ramzan on confronting Digital Transformation’s Dark Side

The Security Ledger

In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.

article thumbnail

Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations

Security Boulevard

These include the newly developed CRYSTALS-Kyber (general encryption) and CRYSTALS-Dilithium, FALCON, and SPHINCS+ (digital signatures) algorithms pending finalizations by NIST. Technology Partners also include: DigiCert, Keyfactor, InfoSec Global, PQ Shield, Quantinuum, SandboxAQ, Senetas, and IDQ.

article thumbnail

Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations

Thales Cloud Protection & Licensing

These include the newly developed CRYSTALS-Kyber (general encryption) and CRYSTALS-Dilithium, FALCON, and SPHINCS+ (digital signatures) algorithms pending finalizations by NIST. Technology Partners also include: DigiCert, Keyfactor, InfoSec Global, PQ Shield, Quantinuum, SandboxAQ, Senetas, and IDQ.

article thumbnail

Harnessing The Benefits of The Thales and Imperva Partner Ecosystem

Thales Cloud Protection & Licensing

Thales provides Double Key Encryption for Microsoft 365 and Client-Side Encryption for Google Workspace. Accenture enables customer migration to Oracle Cloud Infrastructure (OCI) by leveraging Thales CipherTrust Cloud Key Management to maintain complete HYOK control of the encryption keys securing their sensitive data.

article thumbnail

How to Overcome Common SSH Machine Identity Risks with Automation

Security Boulevard

Better visibility for InfoSec teams. Together, encryption key governance is achieved across the entire enterprise, protecting the full life cycle of keys from creation to termination, including the storage and auditing of those keys. Digital Transformation Fails without Machine Identity Management. Related Posts.

Risk 52