4 members / 135 guests (24 hours)
$0.00 (0.00%)
High: $0.00
Low: $0.00
Volume: 0

An Interesting IDB update! And how IDB got even faster.  IDB is fast, reliable, and FREE to use. Just join and start posting!

Securing Key Management



Excerpts:  There has been a fundamental breakthrough in trusted cloud computing over the last few years.  Trusted Computing allows one to using commercial off-the-shelf hardware to perform certain sensitive computation privately.. TPM and Intel Software Guard Extension (SGX) are examples of such technology on x86 platforms.  They allow innovative companies to provide HSM functionality without using purpose-built hardware appliances.  By using trusted computing correctly innovative products can offer HSM grade functionality with software-like functionality.  The advent of trusted cloud computing has huge implications for this once stagnent HSM market for key management systems to best protect enterprise resources in the cloud.  Interesting article imo.