Adoption of Composite Signatures Is Major Milestone for Post... June 2024 by Mike Ounsworth & Iain Beveridge &

Hopefully there’s no need for a post-quantum preamble to this blog. Any techies who have…

New Publication From the Cloud Security Alliance (CSA): Hard... May 2024 by Iain Beveridge

I’ve been part of the Cloud Security Alliance (CSA) Cloud Key Management working group for…

NSA Announces Update to Commercial National Security Algorit... May 2024 by Iain Beveridge

In October 2022, Entrust published the article, NSA Announces New Post-Quantum Resistant Algorithm Suite 2.0…

Don’t Leave the Door Open to Threat Actors April 2024 by Iain Beveridge & Andrew Massi &

We came across this recent Joint Cybersecurity Advisory paper: “Threat Actor Leverages Compromised Account of…

Zero Trust 1975 Style February 2024 by Iain Beveridge & Dave Butcher &

There’s been quite a buzz about Zero Trust in the last couple of years. Its…

Harvest Now, Decrypt Later – Fact or Fiction? November 2023 by Iain Beveridge & Dave Butcher &

A couple of years ago, I published a blog post AES Turns 20, celebrating the…

Everything You Need to Know About 5G Security October 2023 by Iain Beveridge

It’s no secret that the arrival of 5G technology will usher in a new wave…

The data protection puzzle piece for telecoms July 2023 by Iain Beveridge

The telecom and communications industry is undergoing unprecedented change. The ever-growing demand for higher connections…

Post-Quantum Cryptography Advances…Under the Hood June 2023 by Iain Beveridge

A typical scene at a car enthusiasts motorhead event involves souped-up cars with their hoods…

Ownership, Control, and Possession – A New AWS Feature for... December 2022 by Iain Beveridge

I blogged last year about ownership, control, and possession in relation to high-value cryptographic keys,…

Defensive Weapons in Containerized Environments December 2022 by Iain Beveridge

The oldest known example of hardened and tempered metal was a pick-axe found in Galilee…

Preventing Hyperjacking in a virtual environment November 2022 by Iain Beveridge & Dave Stevens &

In the rapidly evolving world of information security, attack vectors, and cyberattacks, there is a…

Retaining Customer Control in a Multi-Cloud Environment October 2022 by Iain Beveridge

In a recent blog I covered the Cloud Security Alliance (CSA) publication: Top Threats to Cloud Computing…

NSA announces new Post-Quantum resistant algorithm Suite 2.0... October 2022 by Iain Beveridge

Recently the National Security Agency (NSA) provided an update on its security posture with regards…

Taking a holistic approach to tackling the Top Threats to Cl... September 2022 by Iain Beveridge

Can you remember the halcyon days of the video game arcades? This will probably date…

Like a zero-day attack but 30 years before it happens September 2022 by Iain Beveridge

The title of the blog are not my words but those of Canadian mathematician and…

Ownership, Control and Possession – Options for Key Manage... December 2021 by Iain Beveridge

My favourite scene from mid-80’s movie Ferris Bueller’s Day Off, was when Ferris (Matthew Broderick)…

HSMs in the cloud – Rockin’ all over the world! December 2021 by Iain Beveridge

Who can recall the first pop/rock performance that played at the Live Aid concerts back…

AES turns 20 November 2021 by Iain Beveridge

“It was twenty years ago today” is the opening lyric to Sgt Pepper’s Lonely Hearts…

Mitigating the NOBELIUM FoggyWeb threat with HSMs October 2021 by Iain Beveridge

Last week, Microsoft published news about FoggyWeb, another sophisticated persistent backdoor hack which is designed…

Security – Getting it right first time August 2021 by Iain Beveridge

Leo Fender brought the Fender Stratocaster electric guitar to market in 1954. At the time…

Navigating your way in the cloud July 2021 by Iain Beveridge

Imagine sailing the Pacific Ocean for the first time. It’s a voyage that could be…

A bridge to post-quantum cryptography July 2021 by Iain Beveridge

The Tacoma Narrows suspension bridge- which spanned the Puget Sound in Washington state, USA –…

Double Key Encryption December 2020 by Iain Beveridge

Does anyone remember double albums aka double LPs? I’m talking vinyl records of course, before…

Protect your organization from a SolarWinds-type attack December 2020 by Jenn Markey & Iain Beveridge &

As the impact of the recent SolarWinds cyberattack continues to emerge, the method of attack…

Essential purchase…? New payment options November 2020 by Iain Beveridge

Has anyone made any impulse online purchases during the lockdown period? The last six months…

21st century remote May 2020 by Iain Beveridge

I’m not really one for bucket lists. However, if I did have one, fairly near…

Post-Quantum TV May 2020 by Iain Beveridge

Has anyone watched Devs yet? It’s a new science fiction, thriller television mini-series written by…

The Entrust Security Web Services Option Pack …reasons to ... February 2020 by Iain Beveridge

I had an earworm this morning, Ian Dury and the Blockheads 1979 hit “Reasons to…

The Entrust nShield container option pack February 2020 by Iain Beveridge

Containerization is the architectural model of choice in forward-thinking cloud and enterprise deployments for those…

  • Sort by

  • Topic