Q&A with Dr. Charles Clancy, executive director of Virginia Tech’s Hume Center for National Security and Technology, engineering professor, and author TPG: Tell us how you’re involved in cybersecurity for telecommunications. CC: I have been working at the intersection of cybersecurity and telecommunications for the past 20 years. When I was a PhD student, WiFi…Read More
Q&A with Ryan Smith, vice president, global business development, Futurex TPG: Tell us about your cryptographic solutions. RS: Futurex is a global manufacturer of FIPS 140-2 Level 3 and PCI HSM validated hardware security modules and enterprise security applications. At a high level, our focus is on three areas: cryptographic processing, key and certificate management,…Read More
Q&A with Cindy Provin, CEO, nCipher Security TPG: There has been lots of news lately about your company being acquired by Entrust Datacard. What’s the latest with nCipher Security? CP: nCipher Security is a separate company within Thales. nCipher has been operating as a separate stand-alone business within Thales since January 2019. We continue to…Read More
Q&A with J.J. Stapleton, co-author of Security without Obscurity: A Guide to PKI Operations
TPG: What practical advice do you have for an organization considering deploying a PKI solution?
JS: There are various PKI architectures to consider. An internal private PKI deployed wholly within the organization, a hosted private PKI deployed at a third-party service provider, or an external public PKI operated by a commercial third party. Each has pros and cons…Read More
Q&A with Bruno Couillard, president and CTO, Crypto4A TPG: Your hardware security module (HSM) architecture team has an interesting history in the world of cryptography—can you tell us about that? BC: Many of our team, (including myself and the other three founders) have been consistently in the crypto and cybersecurity space for decades. Some of…Read More