SINGAPORE--(BUSINESS WIRE)--KAYTUS, a leading IT infrastructure provider, received the cryptographic module security certification against ISO/IEC 19790:2012 International Standard, becoming the first ...
CIQ, the founding support and services partner of Rocky Linux, today announced that RLC Pro and RLC Pro Hardened are the ...
TOKYO--(BUSINESS WIRE)--Kioxia Corporation, a world leader in memory solutions, today announced that the cryptographic module used in KIOXIA CM7 Series PCIe ® 5.0 NVMe™ Enterprise SSDs has been ...
HyTrust Inc. announced that the HyTrust KeyControl Cryptographic Module has entered the validation process for FIPS 140-2 compliance. By adding FIPS 140-2 validation, HyTrust will continue to ...
BEAVERTON, Ore. — New guidance to accelerate the availability of FIPS 140-3 certified cryptographic solutions has been published by the Trusted Computing Group (TCG). FIPS 140-3 refers to the third ...
Digi International Announces FIPS 140-3 Validation for Cryptographic Security on Digi Accelerated Linux-Based Solutions ...
The Korea Internet & Security Agency (KISA) announced on the 24th that it is recruiting companies to participate in consulting for the development of verification submissions for cryptographic modules ...
A cryptographic module for tactical radios developed by General Dynamics C4 Systems has been certified by the National Security Agency to transmit secure classified information up to and including top ...
The Entrust nShield HSM implementation of three NIST standardized post-quantum algorithms have been validated by NIST’s Cryptographic Algorithm Validation Program (CAVP). The latest firmware (v13.8.0) ...
The MIDS-LVT Cryptographic Module will replace the communication security and transmission security hardware in the MIDS-LVT; thereby extending the operational life of the MIDS-LVT product line. This ...
Potentially saving the world from another online security disaster like last year’s Heartbleed, Amazon Web Services has released as open source a cryptographic module for securing sensitive data ...
The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its useful life, according to security experts at the National Institute of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results