3Key

Application cryptography under control!

Posted on

it is a usual situation when something bad happens. Who is responsible for the issue related to cryptographic functions of the application? Question which we are not able to answer and often we see arguing between different teams like developers, testers, and operation. Instead of this we need to behave as one environment, one team, […]

Key Management

Importance of Key Attributes

Posted on

Key management is important topic when it comes to protection of critical assets at rest, or during transfer. However, it is very often omitted and we are exposing sensitive data to potential attackers. The reason is probably lack of experience and knowledge in the field of cryptography which is tightly connected with that. We are […]