Hi [[ session.user.profile.firstName ]]

3 Critical Steps to Maximize Crypto Security

Random numbers are the lifeblood of crypto but are often taken for granted. Poor randomness makes keys more predictable and weakens security. Getting random number generation right is already a challenge, and in the virtualized world of cloud computing and constrained devices of the IoT, the situation is likely to get worse.

Join our live webinar to learn how you can easily upgrade your systems to take the uncertainty out of random number generation.
*Assess your current systems – learn why random numbers are so critical, how they are generated and if you can prove that everything is working
*Learn about ways to generate entropy, improve random numbers and test for compliance
*Deploy solutions to strengthen your data center and distributed applications without expensive changes or operational burden
Recorded Jun 28 2016 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Richard Moulds
Presentation preview: 3 Critical Steps to Maximize Crypto Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 3 Critical Steps to Maximize Crypto Security Recorded: Jun 28 2016 58 mins
    Richard Moulds
    Random numbers are the lifeblood of crypto but are often taken for granted. Poor randomness makes keys more predictable and weakens security. Getting random number generation right is already a challenge, and in the virtualized world of cloud computing and constrained devices of the IoT, the situation is likely to get worse.

    Join our live webinar to learn how you can easily upgrade your systems to take the uncertainty out of random number generation.
    *Assess your current systems – learn why random numbers are so critical, how they are generated and if you can prove that everything is working
    *Learn about ways to generate entropy, improve random numbers and test for compliance
    *Deploy solutions to strengthen your data center and distributed applications without expensive changes or operational burden
  • Building Trust and Keeping Secrets in the IoT Recorded: Apr 20 2016 48 mins
    Richard Moulds, Vice President, Strategy Whitewood; Chris Conlon, Solution Evangelist, wolfSSL
    When devices in the Internet of Things (IoT) handle sensitive data or perform safety critical tasks, it’s essential that they can be trusted. Devices need to be able to store data and communicate confidentially. They need to prove their identity and verify that messages they send and receive have not been tampered with. These critical security capabilities all rely on cryptography – and all cryptography relies on secrets. Whether using encryption, digital IDs or signatures keeping secrets is still only a part of the challenge. Implementing the core crypto algorithms and protocols can be error prone, resource hungry and slow in operation – all of which can impact user confidence and vendor credibility.

    During this webinar, experts from Whitewood and wolfSSL will highlight the pitfalls and solutions for crypto enabling your IoT security to build trust, minimize risk and accelerate time to market.
  • Strengthening Crypto Through Quantum Randomness Recorded: Jan 27 2016 61 mins
    Dr. Richard Hughes, Physicist and Retired Fellow, LANL & Richard Moulds, Vice President, Whitewood
    Random numbers and the entropy they contain is the foundation of secure cryptography. Yet, providing sufficient random numbers and entropy with assurances that it cannot be known, monitored, controlled or manipulated by others has proven to be remarkably difficult. How do you know if your random numbers are truly random, and how can you insure that your security system is secure?
  • Random Numbers - Who's in Control? Recorded: Oct 7 2015 62 mins
    Bruce Potter, CTO of KEYW Corporation; Richard Moulds, VP, Whitewood Encryption Systems
    The importance of cryptography in the security systems continues to increase, and has become a mainstream issue. Yet it is a complex topic that is misunderstood by many. This 60 minute webinar reveals important new research into common pitfalls and misconceptions about crypto security. Originally presented at Black Hat 2015, this session discusses how random numbers and entropy are generated and how they are consumed by the most common crypto applications and protocols including SSL/TLS.

    Attendees will have the opportunity to ask questions about the research and gain a better understanding of what’s really going on with random number generation in their own systems and assess the practical impact on the their overall security posture.
Live Webinar Series - Securing Your Crypto Infrastructure
This channel helps security architects better understand the complexities and need for truly random number generation

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 3 Critical Steps to Maximize Crypto Security
  • Live at: Jun 28 2016 4:00 pm
  • Presented by: Richard Moulds
  • From:
Your email has been sent.
or close