Right in the middle of the holiday season, as much of the world was preparing to take some deserved time off to celebrate with their families and bid 2020 a less-than-fond farewell, some terrible news broke involving a number of…
Five Common Encryption Key Management Challenges
The “security by obscurity” obfuscation method involves concealing details of encryption algorithms to make them harder for threat actors to crack, but it often relies on the use of weak cryptography. Once the secrets of the algorithm’s implementation are discovered…
Why a new approach to encryption is essential for today’s government applications
Over the past decade, the role of software in the federal government has evolved from something that increased operational efficiency or made life easier, to completely mission-critical to agencies and military organizations. Software is key to federal digital transformation initiatives,…