August 2024 Newsletter

 

 

SIDECHAIN INSIGHTS

We wondered how an AI engine would graphically interpret Sidechain Security.

Lots of chains!

image placeholder

Quick Take

  • June 30th marked the end of life for the Vormetric Data Security Manager (DSM) product with a focus on the next generation replacement, CipherTrust Manager. See our Press Release for more information
  • See an overview of Sidechain’s current expanded product offerings

Quiz

Which of the following algorithms was recently approved by NIST to address post-quantum cryptography key security?

A.       AES-256

B.       ML-KEM-512

C.      KMIP

D.      SHA-224

Keep scrolling to see if you got it right!

Industry Trends

  • In mid-August, NIST released approvals for the first set of quantum-safe cryptographic algorithms. This move sets in motion an accelerating pace to enable Federal and private sector organizations to address the threat that post-quantum computing poses to existing RSA cryptography. READ MORE
  • Last week’s staggering data breach at National Public Data released the personal information, including Social Security Numbers, of billions of Americans. See if your information was exposed at npd.pentester.com
  • The data security market continues to grow significantly with the use of digital devices like smartphones and laptops, strict compliance laws like GDPR, PCI, ISO, the rising popularity of the Internet of Things (IoT) and the data produced by IoT devices, all playing apart in contributing to this.  We’re also seeing an increased presence of AI in assisting security departments to keep ahead of threats
  • A need for end-to-end security is fueling substantial growth in the Mobile Encryption Market as more companies allow employees to BYOD (Bring Your Own Device), work remotely and therefore deal with data breaches as a result of lost or stolen devices.  With the use of mobile encryption software, data can be protected and unreadable by anyone else, driving growth in this sector.

Data Encryption Decoded

What is a Hardware Security Module?

We’re seeing an increase in customers favoring HSM’s and entrusting a dedicated team like Sidechain to secure and oversee their critical data security functions. If you want to know more about what an HSM is, read all about it here.

What is the difference between TPM and HSM Security?

Curious about the distinction between Trusted Platform Modules (TPM) and Hardware Security Modules (HSM) with regard to security protocols? Learn more here

Did you know?

  • The answer to the quiz is: ML-KEM-512, a key security algorithm that can safely be used for key exchange between counterparties. Once a symmetric key is securely shared, a traditional key like AES-256 can safely be used for encrypted data sharing.
  • The word Cryptography comes from the Greek words“Kryptos” meaning and hidden and “Graphein”, meaning word
  • One of the most ancient forms of encryption isletter substitution.  Here’s an example using the next letter over in your message: Sidechain Security for all your data encryption needs becomes “Tjefdibjo Tfdvsjuz gps bmm zpvs ebub fodszqujpo offet”!

 

Speak to an expert

Thank you for reaching out. One of our experts will be in touch with you.