Key Management in the Cloud

In my previous cloud security blogs, I mentioned the need to use key-based encryption for protecting data. Whether the data is in flight (i.e., being transmitted) or at rest (i.e., stored), it must be encrypted to ensure confidentiality, integrity and availability. Managing encryption keys can be challenging. There are different key types (symmetric vs. asymmetric), key strengths (128-bit through 2048-bit and greater), key usage (privacy, key exchange, authentication and digital signature) and key encryption algorithms (AES, 3DES, SHA-1, SHA-2, MD5, etc). Furthermore, each data end point, like storage or server, requires an integration point that also needs to be managed. For example, for storage we need an encryption integration point for each storage medium (disk, SAN, NAS or tape).

Read more

8 Things You Need to Know about Windows 10

July 29, 2015 is the official release date of Windows 10, and Microsoft is putting a lot behind their latest operating system. The company’s top executives have promised to have Windows 10 running on a billion devices within two to three years. To get to those numbers Microsoft is pulling out all the stops, offering Windows 10 as a free upgrade to PC owners running Windows 7 or Windows 8, as well as making it free for small devices. Although Windows is still the number one desktop operating system in the world, PCs have seen their market share steadily decrease over the last few years to the benefit of portable devices.

Read more