by Cecile Abescat | Dec 5, 2023 | Key Management Service
Why use a Cloud-External Key Management System (KMS)? by Sandrine | Feb 6, 2024 | Cryptography, Engineering, Security The Importance of a Cloud-External Key Management System (KMS)1. Enhanced Security2. Multi-Cloud Strategy Enablement3. Vendor Locking Mitigation4....
by Cecile Abescat | Nov 28, 2023 | Business Case, Engineering
Intel TDX: understanding the core of Confidential Computing by Sandrine | Feb 6, 2024 | Cryptography, Engineering, Security What is Intel TDX and How Does it Complement Intel SGX?How Cosmian Helps Customers Leverage These Technologies?Trying Out with Cosmian’s...
by Cecile Abescat | Nov 3, 2023 | Cryptography, Engineering
Two-Factor Authorization: the ultimate access control by Sandrine | Feb 6, 2024 | Cryptography, Engineering, Security What is Two-Factor Authorization?Two-Factor Authorization: a Revolution Relying on Attribute-Based EncryptionNavigating the Three-Dimensional...