Tag: hardware security module

  • Cloud Blog: Cloud CISO Perspectives: 27 security announcements at Next ‘25

    Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-27-security-announcements-next-25/ Source: Cloud Blog Title: Cloud CISO Perspectives: 27 security announcements at Next ‘25 Feedly Summary: Welcome to the first Cloud CISO Perspectives for April 2025. Today, Google Cloud Security’s Peter Bailey reviews our top 27 security announcements from Next ‘25.As with all Cloud CISO Perspectives, the contents of this newsletter are posted…

  • Cloud Blog: Driving secure innovation with AI and Google Unified Security

    Source URL: https://cloud.google.com/blog/products/identity-security/driving-secure-innovation-with-ai-google-unified-security-next25/ Source: Cloud Blog Title: Driving secure innovation with AI and Google Unified Security Feedly Summary: Today at Google Cloud Next, we are announcing Google Unified Security, new security agents, and innovations across our security portfolio designed to deliver stronger security outcomes and enable every organization to make Google a part of their…

  • Cloud Blog: Announcing quantum-safe digital signatures in Cloud KMS

    Source URL: https://cloud.google.com/blog/products/identity-security/announcing-quantum-safe-digital-signatures-in-cloud-kms/ Source: Cloud Blog Title: Announcing quantum-safe digital signatures in Cloud KMS Feedly Summary: The continued advancement of experimental quantum computing has raised concerns about the security of many of the world’s widely-used public-key cryptography systems. Crucially, there exists the potential for sufficiently large, cryptographically-relevant quantum computers to break these algorithms. This potential…

  • NCSC Feed: MIKEY-SAKKE frequently asked questions

    Source URL: https://www.ncsc.gov.uk/guidance/mikey-sakke-frequently-asked-questions Source: NCSC Feed Title: MIKEY-SAKKE frequently asked questions Feedly Summary: A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with end-to-end encryption. AI Summary and Description: Yes Summary: The text discusses the deployment of a Key Management System (KMS) within a Hardware Security Module (HSM) for enhanced…

  • Hacker News: A Brief History of Code Signing at Mozilla

    Source URL: https://hearsum.ca/posts/history-of-code-signing-at-mozilla/ Source: Hacker News Title: A Brief History of Code Signing at Mozilla Feedly Summary: Comments AI Summary and Description: Yes **Summary:** This text explores the evolution of code signing processes at Mozilla, detailing the complexity of securely shipping software to end-user devices over the last two decades. It emphasizes improvements in automation…

  • The Register: Microsoft unveils beefy custom AMD chip to crunch HPC workloads on Azure

    Source URL: https://www.theregister.com/2024/11/20/microsoft_azure_custom_amd/ Source: The Register Title: Microsoft unveils beefy custom AMD chip to crunch HPC workloads on Azure Feedly Summary: In-house DPU and HSM silicon also shown off Ignite One of the advantages of being a megacorp is that you can customize the silicon that underpins your infrastructure, as Microsoft is demonstrating at this…