Skip to main content

Blog Posts: Hardware Security Modules

New Publication From the Cloud Security Alliance (CSA): Hard... May 2024 by Iain Beveridge

I’ve been part of the Cloud Security Alliance (CSA) Cloud Key Management working group for…

Four considerations when selecting as-a-Service Hardware Sec... November 2023 by Andrew Tweedie

Keeping up with the latest security challenges can feel like you are running a race…

External Key Storage for AWS cloud using nShield HSMs October 2023 by Oli Wade & Jonathan Jenkyn &

On November 29, 2022, AWS announced the eXternal Key Store (XKS) capability for AWS Key…

Protecting the EU’s critical infrastructure from cyberatta... October 2023 by Juan C. Asenjo

The critical infrastructure is commonly defined as the systems and networks that provide basic services…

Everything You Need to Know About 5G Security October 2023 by Iain Beveridge

It’s no secret that the arrival of 5G technology will usher in a new wave…

The data protection puzzle piece for telecoms July 2023 by Iain Beveridge

The telecom and communications industry is undergoing unprecedented change. The ever-growing demand for higher connections…

The State of Post Quantum Preparedness, from an Analyst Pers... May 2023 by Samantha Mabey

As part of my hosting duties on the Entrust Engage podcast, I’ve had the pleasure…

The critical role of CLM for Zero Trust today, and PQ tomorr... May 2023 by Samantha Mabey

Certificate lifecycle management (CLM) is a critical requirement for organizations. In the past we’ve talked…

How government action is providing a blueprint for post-quan... April 2023 by Samantha Mabey

The quantum threat is out there. And it’s not a matter of “if”, but a…

Back to the future of hardware security modules April 2023 by Juan C. Asenjo

In a scene from the 1980s hit movie Back to the Future, Marty (played by…

  • Sort by

  • Topic