
SIDECHAIN INSIGHTS
We wondered how an AI engine would graphically interpret Sidechain Security. Lots of chains!

QUICK TAKE
June 30th marked the end of life for the Vormetric Data Security Manager (DSM) product with a focus on the next generation replacement, CipherTrust Manager. See our Press Release for more information
See an overview of Sidechain’s current expanded product offerings.
QUIZ

Tech Support scams – You get a phone call, pop-up, or email telling you there’s a problem with your computer. What would you do next? Take this quiz to see how much you know and what you would do in these situations! The first five people to send their correct answers to us here, will receive Sidechain swag!
1. Which of the following algorithms was recently approved by NIST to address post-quantum cryptography key security?
- AES-256
- ML-KEM-512
- KMIP
- SHA-224
Keep scrolling to see if you got it right!
INDUSTRY TRENDS & NEWS
- In mid-August, NIST released approvals for the first set of quantum-safe cryptographic algorithms. This move sets in motion an accelerating pace to enable Federal and private sector organizations to address the threat that post-quantum computing poses to existing RSA cryptography. READ MORE
- Last week’s staggering data breach at National Public Data released the personal information, including Social Security Numbers, of billions of Americans. See if your information was exposed at npd.pentester.com
- The data security market continues to grow significantly with the use of digital devices like smartphones and laptops, strict compliance laws like GDPR, PCI, ISO, the rising popularity of the Internet of Things (IoT) and the data produced by IoT devices, all playing apart in contributing to this. We’re also seeing an increased presence of AI in assisting security departments to keep ahead of threats
- A need for end-to-end security is fueling substantial growth in the Mobile Encryption Market as more companies allow employees to BYOD (Bring Your Own Device), work remotely and therefore deal with data breaches as a result of lost or stolen devices. With the use of mobile encryption software, data can be protected and unreadable by anyone else, driving growth in this sector.
DATA ENCRYPTION DECODED

What is a Hardware Security Module? We’re seeing an increase in customers favoring HSM’s and entrusting a dedicated team like Sidechain to secure and oversee their critical data security functions. If you want to know more about what an HSM is, read all about it here.
What is the difference between TPM and HSM Security? Curious about the distinction between Trusted Platform Modules (TPM) and Hardware Security Modules (HSM) with regard to security protocols? Learn more here
DID YOU KNOW?

The answer to the quiz is: ML-KEM-512, a key security algorithm that can safely be used for key exchange between counterparties. Once a symmetric key is securely shared, a traditional key like AES-256 can safely be used for encrypted data sharing.
The word Cryptography comes from the Greek words“Kryptos” meaning and hidden and “Graphein”, meaning word
One of the most ancient forms of encryption isletter substitution. Here’s an example using the next letter over in your message: Sidechain Security for all your data encryption needs becomes “Tjefdibjo Tfdvsjuz gps bmm zpvs ebub fodszqujpo offet”!
Remember the first 5 correct responses will win Sidechain swag!