Author: Mark Eaton J

Categories : Data Security            Leave a comment           

Our recent blog (UK Government PKI) reflected on enterprise cryptographic products being used successfully to protect UK Government IT Systems, with a particular focus on public key infrastructures. Indeed, the application of hardware security modules (HSMs) to protect keys in a certified hardware environment is now broadening to support the demand for higher assurance security in other areas of IT. For example, cloud service providers are now embedding HSMs into their data centres to allow organisations to take advantage of […]