Deep Dive on AWS-Key Management Service
Posted on21 Nov 2020
TagsAsymmetric CMK, AWS KMS, BYOK., CMK (Customer Master Key), custom key store, Data encryption, Data Keys, Data-at-rest, Data-in-use, Decrypt, IAM Policies, Key Policies, key store, Symmetric CMK
Comments0
Read Time: 08 min Data encryption on the cloud is the most prominent thought every security professional has in their mind these days. While performing... Read More
Data Encryption Options in Google Cloud
Posted on07 Nov 2020
Comments0
Read time: 5 mins Encryption is a process that takes plaintext as input and transforms it into an output (ciphertext) that reveals no information about... Read More
Business aspects of FPE with NIST recommendations
In 2014, JPMorgan Chase was under a massive cyber- attack in which the data of 76 million private customers and 7 million business customers was... Read More
Format Preserving Encryption on GCP
Posted on28 Aug 2020
Comments0
Online data security has always been important, but never more so than now. With more and more of our data being stored on the cloud,... Read More