SINGAPORE--(BUSINESS WIRE)--KAYTUS, a leading IT infrastructure provider, received the cryptographic module security certification against ISO/IEC 19790:2012 International Standard, becoming the first ...
Digi International Announces FIPS 140-3 Validation for Cryptographic Security on Digi Accelerated Linux-Based Solutions ...
TOKYO--(BUSINESS WIRE)--Kioxia Corporation, a world leader in memory solutions, today announced that the cryptographic module used in KIOXIA CM7 Series PCIe ® 5.0 NVMe™ Enterprise SSDs has been ...
HyTrust Inc. announced that the HyTrust KeyControl Cryptographic Module has entered the validation process for FIPS 140-2 compliance. By adding FIPS 140-2 validation, HyTrust will continue to ...
BEAVERTON, Ore. — New guidance to accelerate the availability of FIPS 140-3 certified cryptographic solutions has been published by the Trusted Computing Group (TCG). FIPS 140-3 refers to the third ...
The Entrust nShield HSM implementation of three NIST standardized post-quantum algorithms have been validated by NIST’s Cryptographic Algorithm Validation Program (CAVP). The latest firmware (v13.8.0) ...
The Korea Internet & Security Agency (KISA) announced on the 24th that it is recruiting companies to participate in consulting for the development of verification submissions for cryptographic modules ...
A cryptographic module for tactical radios developed by General Dynamics C4 Systems has been certified by the National Security Agency to transmit secure classified information up to and including top ...
Amazon just announced the launch of CloudHSM, a new service that provides Amazon Web Services users who need to meet corporate, contractual and regulatory compliance requirements for data security a ...
The MIDS-LVT Cryptographic Module will replace the communication security and transmission security hardware in the MIDS-LVT; thereby extending the operational life of the MIDS-LVT product line. This ...
The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its useful life, according to security experts at the National Institute of ...