encryption | CCSK Guide


Encryption Interoperability and Key Management in the Cloud

The National Institute of Standards and Technology defines a cryptographic key as “a parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot.” Encryption key management…

Read More

China’s MITM Attack Against Apple iCloud Users

According to a report by Great Fire, the internet censorship watchdog, China’s state firewall is performing a Man-in-the-Middle (MITM) attack against Apple’s iCloud users. Allegedly, the attack has been launched in response to Apple’s new default encryption methods. Since the debut of iOS 8, authorities are no longer permitted to bypass on-device encryption to gain…

Read More

Selling Data for Cloud Storage

These days, everything from smart phones, smart stores and smart homes are gathering and commoditizing information about us. It brings to the forefront the value and vulnerability of people’s private data. This has evolved into a huge business opportunity. Recently, a Silent Circle study found that 88 percent of people in the UK alone believe…

Read More

Encryption Remains Rare

Security in the cloud has long been a concern, however, a recent Ponemon Institute report reveals that there has been a minimal increase in terms of encryption within cloud environments. Together with Thales e-Security, an encryption solutions provider, the Ponemon Institute released its third annual report on global trends in cloud encryption. Their findings reflected…

Read More

WS-Security 101

WS-Security outlines enhancements to SOAP messaging in order to provide quality of protection via message integrity, message confidentiality and single-message authentication. These mechanisms can be used to accommodate a wide variety of security models and encryption technologies. SAML vs. WS-Security Contrary to popular belief, SAML and WS-Security are not competitive specifications for web services security….

Read More


  • Sponsored Links

  • Categories

  • Tags

  • Archives