Which TPM 2.0 software stack do you prefer?

For current information on TPM 2.0 and some very helpful links on the standard and the TSS from IBM, Ken Goldman’s page has been a great resource for...

What's the best way to learn about FIPS 140-2?

This year I have the opportunity to represent the team and participate in the International Cryptographic Module Conference in Arlington, VA. This conference is most applicable to the part...

How do we test Kerberos interop in the future?

One of the most useful meetings over the past few years for our team’s developers working on Kerberos and AD has been the MIT Kerberos conference and interop event. With...

Where is your sensitive data overexposed?

I’ve had the opportunity over the past few months to collaborate with some very talented engineers and product managers from Varonis as we learn more about DatAdvantage and how...

KMIP at RSA 2017: freedom from proprietary key management

Here’s a photo I took of the set up that the Crypto and Key Management team had set up at RSA 2017 recently, between the demos from Hancom and HPE....