Public Key Infrastructure
What is PKI?What is the role of Certificate Authorities (CAs)?What is certification authority or root private key theft? What is inadequate separation (segregation) of duties for PKIs? What is insufficient scalability in a PKI?What is a subversion of online certificate validation?What is a lack of trust and non-repudiation in a PKI?Data Security Posture Management (DSPM)
Do existing DSPM and CSPM tools address the challenges of data encryption risks?What is Cloud Security Posture Management (CSPM)? What is Data Security Posture Management (DSPM)? What are the key features of Data Security Posture Management (DSPM)? How important is Data Security Posture Management (DSPM)? How does Data Security Posture Management (DSPM) differ from traditional security measures? What are the benefits of implementing Data Security Posture Management (DSPM) for an organization? How does Data Security Posture Management (DSPM) help identify and remediate security vulnerabilities? What compliance standards does Data Security Posture Management (DSPM) help organizations adhere to?What emerging trends are shaping the future of Data Security Posture Management (DSPM)?How cloud Data Security Posture Management (DSPM) overcomes the challenges of securing keys?AI Security
What is an AI/ML pipeline? What are the components of the AI/ML pipeline?How can I ensure data security and safety in an AI/ML pipeline? What are Large Language Models (LLMs)? How do Large Language Models (LLMs) work?What are the benefits of Large Language Models (LLMs)?What is the data security risks with Large Language Models (LLMs)?How do I address data security concerns with Large Language Models (LLMs)? Is Generative AI (Genai) different than Large Language Models (LLMs)?What is Generative AI (Gen AI) security? What is Retrieval-Augmented Generation (RAG)? What is Retrieval-Augmented Generation (RAGs) used for?What are the benefits of Retrieval-Augmented Generation (RAG)?Are there security risks with Retrieval-Augmented Generation (RAG)? How can we address Retrieval-Augmented Generation (RAG security) vulnerabilities?What are key AI security challenges and risks? What is data poisoning? How do I prevent data poison attack? What is prompt engineering?What is a prompt injection attack? What is AI governance? Why is AI governance important? What is Large Language Models (LLM) security?Data Security
What negative business impact can result from data security siloes and lack of monitoring?What is data security? What are the types of data security? What are data security capabilities and tools? How can businesses protect against data breaches? Why is data security necessary for your business?What are the common threats to data security? How can you improve data security in your organization?What is the role of compliance regulations in data security?What are the best practices for securing personal data?Is it safe to store data in the cloud? What are individual responsibilities for protecting company data?Post Quantum Cryptography
What is the quantum risk and its impact on data security?What are the implications of data sensitivity vs time?When will quantum computing pose a threat to encryption methods?Which protocols and certificates may become vulnerable in the post-quantum era?How can enterprises prepare data security strategies for the post-quantum era?Do current cloud platforms support post-quantum algorithms?What is the concept of cryptographic agility?How does cryptographic agility impact risk management for enterprises?Why is data classification important in the context of post-quantum readiness?How does crypto agility affect disaster recovery planning and insurance costs?What is the technical impact of post-quantum agility on organizations?How does Fortanix DSM help achieve cryptographic agility?What features does Fortanix DSM offer for key lifecycle management in PQC implementation?How does Fortanix DSM facilitate integration with leading applications in PQC implementation?Tokenization
What is Tokenization?Why should I care about Tokenization? What are the various methods of tokenization? What is the advantage of Tokenization over Traditional Static or Dynamic Data Masking? What is the advantage of Tokenization over Database encryption? What is the optimal point in the data lifecycle to tokenize sensitive data?  What is Card Tokenization?How does card tokenization work?How does tokenization make online payments more secure?What is network tokenization?What is PCI DSS 4.0?How to comply with PCI DSS 4.0?When is PCI DSS 4.0 required?How Many New Controls are in PCI DSS 4.0?How many requirements in PCI DSS 4.0?Enterprise Key Management
What is enterprise key management?Why is enterprise key management important?What are the benefits of using Enterprise Key Management for cloud data security?What are the challenges in enterprise key management?How does enterprise key management work?What are some best practices for enterprise key management?Can enterprise key management be integrated with existing systems?What are the compliance considerations for enterprise key management?Can enterprise key management recover encrypted data if a key is lost?How does enterprise key management address cloud and multi-cloud environments?Are there industry standards for enterprise key management?What are the pain points related to data security in hybrid multicloud environments ?How do encryption and key management contribute to data protection? How does Fortanix address the challenges associated with encryption key management?How does Fortanix Enterprise Key Posture Management (EKPM) provide visibility into data security risks and industry benchmarks? How does Fortanix address the challenge of reporting compliance with policies and regulations?How does Fortanix Enterprise Key Posture Management (EKPM) align with regulatory and data security policies and standards? How does Fortanix Enterprise Key Posture Management (EKPM) simplify the complex and time-consuming task of correlating and analyzing at-risk data and services? How does Fortanix Enterprise Key Posture Management (EKPM) help organizations prioritize and remediate the most harmful risks quickly? Why are manual discovery processes considered complex and time-consuming, and how does Fortanix Enterprise Key Posture Management (EKPM) simplify them? How does Fortanix Enterprise Key Posture Management (EKPM) reduce the inefficient use of security personnel?Can Fortanix Enterprise Key Posture Management (EKPM) integrate with existing security and compliance tools? Does Fortanix Enterprise Key Posture Management (EKPM) integrate with SIEM or SOAR solutions for log analytics? Can Fortanix Enterprise Key Posture Management (EKPM) integrate with third-party IT ticketing systems for remediation workflows?IoT Security
Why Is Device Authentication Necessary for the IoT?Why Is Code Signing Necessary for IoT Devices?What is IoT PKI?What is IoT Security in cloud data security, and what are the requirements?Confidential Computing
What is Confidential Computing?What are the origins Of Confidential Computing?What companies are driving the adoption of Confidential Computing?How does Confidential Computing protect data?What are the benefits of using Confidential Computing?How does Confidential Computing help with regulatory compliance requirements?Who Needs Confidential Computing?What are some examples of Confidential Computing use cases?Zero Trust Architecture
What is Zero Trust Architecture in data security?Why are traditional approaches to protecting data not effective anymore?According to NIST, what are the key principles of Zero Trust Architecture?What are some popular ways of implementing Zero Trust Architecture?What are the considerations when implementing Zero Trust cryptography?Why do you need Zero Trust security in the cloud? How does Zero Trust Architecture solve today's challenges in cloud security?How does confidential computing enhance Zero Trust?Hardware Security Module
What is a Hardware Security Module (HSM)?How a Hardware Security Module (HSM) works?How are keys and other sensitive data stored and managed in an HSM?What are the compliance standards that an HSM must meet?What is HSM SaaS?How does HSM SaaS differ from physical HSMs?How does an HSM SaaS protect against tampering and unauthorized access in a cloud environment?What are the benefits of using HSM SaaS?How does HSM SaaS ensure the security of sensitive data?Can HSM SaaS be used with existing systems and processes?How does HSM SaaS ensure the availability and reliability of sensitive data?Who can benefit from using HSM SaaS?What is FIPS 140-2 Level 3 HSMEncryption
What is Storage Encryption?What is Network Encryption?What is Transparent Encryption?What is End-to-End Encryption?What is Point-to-Point Encryption?What is Application Layer Encryption?What is Tokenization?What is Dynamic Masking?What is Data at Rest?What is Full-Disk Encryption (FDE) and What are Self-Encrypting Drives (SED)?What is data center interconnect (DCI) layer 2 encryption?What challenges arise from the proliferation of encryption across different services?Code Signing, Certificates, Stamping
What is a Digital Certificate?What is a Certificate Authority?What is Code Signing?What is a Digital Signature?What is Time Stamping?AWS External Key Store
What is the AWS KMS eXternal Key Store (XKS) service? How does AWS XKS with Fortanix DSM work? What are the benefits of AWS XKS and Fortanix Integration?What are the benefits of Key provenance in AWS XKS?What are the benefits of Key centralization in AWS XKS?What are the benefits of Key control in AWS XKS?Which AWS cloud services are supported by AWS KMS External Key Store? How can AWS XKS integrate with Fortanix DSM? How does international data transfer from Europe work with Fortanix? How does Fortanix DSM as XKS affect KMS service reliability and performance? What is the latency of the XKS service offered by DSM SaaS? Do AWS Services cache Data Encryption Keys serve by AWS KMS? For how long?Google External Key Manager Service (EKM)
What is Google Cloud’s External Key Manager Service?How does Google Cloud’s External Key Manager work?What are the benefits of Key provenance in Google EKM? What are the benefits of Key centralization in Google EKM?What are the benefits of Key control in Google EKM?How Do You Decide When and How Can Your Data Be Decrypted? What are the requirements when implementing External Key Management? What are the Service integrations and technical considerations in Google EKMWhich GCP services are supported by Fortanix DSM? How Is Google EKM Available with Fortanix Integration? How does international data transfer from Europe work with Fortanix?Multi-Cloud Data Security
How do I move my existing data security controls from On-Prem to the Cloud? How do I protect data as I move and store it in the Cloud? How do I ensure the cloud provider does not access my data?Can I use my encryption keys in the Cloud?How do I enforce data residency policies in the Cloud and comply with GDPR? How do I track and monitor data access and usage in the Cloud? Can I secure containers in the cloud or across different clouds? What is the Shared Security Model? What is Hybrid multicloud?Key & Secrets Management
What is Encryption Key Management?What is Secrets Management? What is a Centralized Key Management System? What is Bring Your Own Key (BYOK)? What is a Credentials Management System? What is Key Management Interoperability Protocol (KMIP)? What is a Symmetric Key? What is an Asymmetric Key? What is Key Lifecycle Management?What is multi-cloud key management?What is a subversion of online certificate validation?
Subversion of online certificate validation refers to an attacker manipulating the certificate validation process to authenticate a fraudulent certificate successfully. Below are the popular attempts.
Man-in-the-middle attack: An attacker intercepts and alters the communication between a user and a certificate authority (CA) to present a fraudulent certificate to the user.
Phishing: An attacker tricks a user into visiting a fake website that presents a fraudulent certificate and then uses the user's trust in the certificate to steal sensitive information.
DNS spoofing: An attacker alters the Domain Name System (DNS) records to redirect users to a fake website that presents a fraudulent certificate.
Rogue CA: An attacker creates a fake CA and issues fraudulent certificates that users and systems recognize as valid.
Organizations must use robust certificate validation techniques, such as certificate pinning, and keep the list of trusted CAs up to date. Users must educate themselves on the risks of phishing and other types of attacks.
Keeping the software and browser updated can protect them against vulnerabilities causing subversion of certificates.
Learn more about:
Securing Your Public Key Infrastructure
How Fortanix Self-Defending Key Management Service Achieves VMware Ready Status