- 71
- 271 599
Cryptosense
France
เข้าร่วมเมื่อ 13 ส.ค. 2019
Cryptosense’s mission is to make secure cryptography easy to use for everyone. That means solving problems of visibility, policy control and vulnerability analysis everywhere cryptography is deployed in modern IT.
Cryptosense has become the world's leading platform for cryptography lifecycle management. We provide our customers a single source of truth for the security and compliance of cryptography used in modern IT.
In major organizations, fear of cryptography failure blocks necessary digital transformation and migration to public cloud. Cryptosense provides an automated software solution to this problem. Our product, Cryptosense Analyzer Platform (CAP) is used by leading financial institutions and technology companies worldwide.
By giving our customers the confidence that their data is always kept secure, they are able to safely and securely adopt new technologies and practices, such as Cloud and DevOps.
Visit cryptosense.com for more information.
Cryptosense has become the world's leading platform for cryptography lifecycle management. We provide our customers a single source of truth for the security and compliance of cryptography used in modern IT.
In major organizations, fear of cryptography failure blocks necessary digital transformation and migration to public cloud. Cryptosense provides an automated software solution to this problem. Our product, Cryptosense Analyzer Platform (CAP) is used by leading financial institutions and technology companies worldwide.
By giving our customers the confidence that their data is always kept secure, they are able to safely and securely adopt new technologies and practices, such as Cloud and DevOps.
Visit cryptosense.com for more information.
Learn Cryptography | Part 5 - Hash Functions
/////
Find out more about Cryptosense: cryptosense.com
Follow us on Twitter: cryptosense
/////
Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense in 2013. His cryptography expertise is the basis for the company's 'Analyzer' technology which allows customers to protect themselves against losing sensitive data.
Find out more about Cryptosense: cryptosense.com
Follow us on Twitter: cryptosense
/////
Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense in 2013. His cryptography expertise is the basis for the company's 'Analyzer' technology which allows customers to protect themselves against losing sensitive data.
มุมมอง: 1 237
วีดีโอ
DEMO RECORDING - Understand the Docker Container Image Test Results
มุมมอง 6422 ปีที่แล้ว
Last month we decided it would be interesting to test the 50 most popular Docker base images with Cryptosense Analyzer to see what we could find. You can explore the report for yourself here: cryptosense.com/signup More and more of us deliver our applications in containers. Often, we build our final container images on existing base images, which means our production deployments inherit everyth...
WEBINAR RECORDING - Building a Crypto-Agile Organization
มุมมอง 4322 ปีที่แล้ว
In this #webinar Dr Graham Steel will discuss practical issues that our customers have raised around crypto-agility including: - How can I introduce crypto-agility into legacy applications? - How do I get crypto-agility into DevSecOps? - How do NIST, NCSC and SafeCode define crypto-agility? - What kind of cryptography inventory is needed for crypto-agility? Cryptographic Agility or Crypto-Agili...
Learn Cryptography | Part 4 - Encryption Modes and Attacks
มุมมอง 8212 ปีที่แล้ว
This is part 4 of our series on cryptography and cryptographic risk. The series is intended to teach you about cryptography from the point of view of things that can go wrong. In this video Graham discusses encryption modes of operation and attacks. Part 1: th-cam.com/video/3t7C2hOJNy8/w-d-xo.html Part 2: th-cam.com/video/osX3A4wdwcs/w-d-xo.html Part 3: th-cam.com/video/O4HBoOMd1Bo/w-d-xo.html ...
Learn Cryptography | Part 3 - Encryption Algorithms and Keylengths
มุมมอง 1.2K2 ปีที่แล้ว
This is part 3 of our series on cryptography and cryptographic risk. The series is intended to teach you about cryptography from the point of view of things that can go wrong. In this video Graham discusses encryption algorithms and keylengths. Part 1: th-cam.com/video/3t7C2hOJNy8/w-d-xo.html Part 2: th-cam.com/video/osX3A4wdwcs/w-d-xo.html Part 4: th-cam.com/video/yFQW19B7eeo/w-d-xo.html Betwe...
Quantum Random Number Generation - Do we really need it?
มุมมอง 3.9K3 ปีที่แล้ว
In this video we talk about how quantum random number generation *might* be better than the standard method for random number generation. For more on post-quantum cryptography see our playlist: th-cam.com/video/-VCt8kIZRiA/w-d-xo.html A related video on quantum key distribution: th-cam.com/video/jS8KBpH5tw4/w-d-xo.html ///// Find out more about Cryptosense: cryptosense.com Follow us on Twitter:...
Learn Cryptography | Part 2 - Breaches and Attacks
มุมมอง 9733 ปีที่แล้ว
This is part 2 of our series teaching you about cryptography risk. The series is intended to teach you about cryptography from the point of view of things that can go wrong. In this video Graham gives more real world examples of some significant cryptography breaches and attacks, explaining exactly what could have been done to prevent them. Part 1: th-cam.com/video/3t7C2hOJNy8/w-d-xo.html Betwe...
Learn Cryptography | Part 1 - Introduction to Cryptography Risk
มุมมอง 2.1K3 ปีที่แล้ว
This is part 1 of our new series on cryptography risk. The series is intended to teach you about cryptography from the point of view of things that can go wrong. In this video Graham explains how commonly used cryptography is throughout ordinary IT infrastructure, and why cryptography risk is important. He also gives real world examples of some significant cryptography breaches and attacks, exp...
Webinar Recording: How to Make an Application FIPS 140 Compliant
มุมมอง 2.3K3 ปีที่แล้ว
In this webinar we do a deep dive on FIPS 140 compliance to find out how to make an application FIPS-compliant. This is part 2 in the FIPS Cryptography series. You can watch part 1 here: th-cam.com/video/F3_LrXScVvs/w-d-xo.html Request a free demo of Cryptosense Analyzer Platform to see how it can help you achieve FIPS 140 compliance: cryptosense.com/analyzer/demo Summary: How do I make my appl...
Quantum Key Distribution - Does anybody really need it?
มุมมอง 3.7K3 ปีที่แล้ว
Using special purpose hardware and the physics of quantum mechanics you can distribute cryptographic keys to be used in a standard symmetric key cryptography way, but is it worth it? Why would we want to distribute keys this way? What are the advantages other than allowing you to tell whether anyone has been "eavesdropping" on the line. In this video we discuss the pros and cons of using quantu...
OpenSSL 3.0 - What are the important changes?
มุมมอง 4.1K3 ปีที่แล้ว
OpenSSL 3.0 has just been released. In this video Graham explains what you need to know about the new version of this highly popular cryptographic library, what makes OpenSSL 3.0 different, and what changes you need to make to be compliant. He explains how the default cipher has changed from the old version of the PKCS#12 standard to the new PBKDF 2 version of the standard, as well as some inte...
How to Make your Diffie-Hellman Key Exchange FIPS Compliant
มุมมอง 1.2K3 ปีที่แล้ว
Get the FIPS cheat sheet here: cryptosense.com/datasheets/fips-cheat-sheet Request a trial of Cryptosense Analyzer to automate checking your applications for FIPS compliance: cryptosense.com/analyzer/demo Diffie-Hellman key exchange is a widely used method to do pair-wise key exchange. However, you may have had the experience that your application crashes when you put it into "strict" FIPS mode...
3 FIPS Cryptography Compliance Properties That You Can't Check Statically
มุมมอง 2.4K3 ปีที่แล้ว
References: 1. FIPS cheat sheet - cryptosense.com/datasheets/fips-cheat-sheet 2. Cryptosense Analyzer - cryptosense.com/analyzer 3. Why Does Cryptographic Software Fail? - people.csail.mit.edu/nickolai/papers/lazar-cryptobugs.pdf 4. RSA keys shall only be used for one scheme, section 5.1 of DSS NIST 186-4 www.nist.gov/publications/digital-signature-standard-dss-2 5. IV requirements, e.g. Append...
What do Germany and France think about Post-Quantum Cryptography?
มุมมอง 1.1K3 ปีที่แล้ว
Post-Quantum Cryptography solution brief: cryptosense.com/solution-briefs/post-quantum-cryptography?PQC More on post-quantum quantum cryptography: cryptosense.com/knowledge-base/post-quantum-cryptography?PQC References: - Post-Quantum Crypto Conference 2021: pqcrypto2021.kr/ - German report on "Post-Quanten-Kryptografie": www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Informationen-un...
Did a Cosmic Ray Zap the Certificate Transparency Log?
มุมมอง 2213 ปีที่แล้ว
What happened on June 30th 2021? Did the YETI 2022 log get struck by a cosmic ray? Learn more about the certificate transparency log and how it works: th-cam.com/video/hqIRIdz-FpA/w-d-xo.html ///// Find out more about Cryptosense: cryptosense.com/ Follow us on Twitter: cryptosense ///// Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense ...
What was the Role of Rogue Certificates in the Kaseya VSA Attack?
มุมมอง 3583 ปีที่แล้ว
What was the Role of Rogue Certificates in the Kaseya VSA Attack?
WEBINAR RECORDING: Cryptography Failures - Part 1
มุมมอง 1.9K3 ปีที่แล้ว
WEBINAR RECORDING: Cryptography Failures - Part 1
The 3rd PQC Standardization Conference - Seven Minute Summary
มุมมอง 2.2K3 ปีที่แล้ว
The 3rd PQC Standardization Conference - Seven Minute Summary
WEBINAR RECORDING: What is FIPS Cryptography? How to get FIPS 140 Compliance?
มุมมอง 11K3 ปีที่แล้ว
WEBINAR RECORDING: What is FIPS Cryptography? How to get FIPS 140 Compliance?
The Codecov Incident - How do supply chain attacks work?
มุมมอง 3823 ปีที่แล้ว
The Codecov Incident - How do supply chain attacks work?
Getting Ready for Post-Quantum Cryptography | NIST's Latest Report
มุมมอง 2.5K3 ปีที่แล้ว
Getting Ready for Post-Quantum Cryptography | NIST's Latest Report
Four Ways to Compromise Public Key Certificates
มุมมอง 8463 ปีที่แล้ว
Four Ways to Compromise Public Key Certificates
Fully Homomorphic Encryption | The Future of Cryptography
มุมมอง 4.2K3 ปีที่แล้ว
Fully Homomorphic Encryption | The Future of Cryptography
What is the Certificate Transparency Log?
มุมมอง 4.8K3 ปีที่แล้ว
What is the Certificate Transparency Log?
Secure Multiparty Computation | The Future of Cryptography
มุมมอง 2.6K3 ปีที่แล้ว
Secure Multiparty Computation | The Future of Cryptography
Zero Knowledge Proofs | The Future of Cryptography
มุมมอง 5K3 ปีที่แล้ว
Zero Knowledge Proofs | The Future of Cryptography
Why do we still have certificate outages in 2021?
มุมมอง 4463 ปีที่แล้ว
Why do we still have certificate outages in 2021?
Explaining Keystores | Part 6 - Bouncy Castle FIPS Keystore (BCFKS)
มุมมอง 3.5K3 ปีที่แล้ว
Explaining Keystores | Part 6 - Bouncy Castle FIPS Keystore (BCFKS)
Explaining Keystores | Part 5 - Bouncy Castle UBER
มุมมอง 2.6K3 ปีที่แล้ว
Explaining Keystores | Part 5 - Bouncy Castle UBER