dcsimg

The 11 Essentials of Enterprise Security

  • The 11 Essentials of Enterprise Security-

    Hardware-based encryption continued

    Best practices / advice: To ensure no backdoor access to your encrypted data make sure that:

    • You choose a cryptographic algorithm from the public domain that's already known to stand up to any attack
    • Your cryptographic keys rely on true random number generation so that they can't be cracked
    • Your cryptographic keys are stored in a safe place, without any backdoors, and are resistant to physical attack.

    Source: The security experts at Utimaco, who offer solutions for hardware-based encryption for cryptographic keys

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22

The 11 Essentials of Enterprise Security

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22
  • The 11 Essentials of Enterprise Security-17

    Hardware-based encryption continued

    Best practices / advice: To ensure no backdoor access to your encrypted data make sure that:

    • You choose a cryptographic algorithm from the public domain that's already known to stand up to any attack
    • Your cryptographic keys rely on true random number generation so that they can't be cracked
    • Your cryptographic keys are stored in a safe place, without any backdoors, and are resistant to physical attack.

    Source: The security experts at Utimaco, who offer solutions for hardware-based encryption for cryptographic keys

The job of an enterprise's chief security officer (CSO) is a difficult one. Devising a strategy that ensures the company's network and data are secure can be a daunting challenge. With high profile breaches like Target and Adobe making headlines recently, enterprise security has finally been brought into the public spotlight. This newfound awareness has put the pressure on enterprises to assure their customers that they are taking every measure possible to boost their security.

This leaves executives asking, where do I start? With so many different considerations to take into account, there is no single solution that will meet all the security needs of a given organization.

Here are the 11 essentials for keeping your enterprise secure.