Topics: End-User Experience
We’ve expanded content for organizations that rely on cryptographic security with information on selecting the right module, the value of certification, current vulnerabilities, and administrative... Read More
Topics: Post-Quantum Crypto
Many approved algorithms can be easily broken by theoretical quantum computers. We’ve scheduled a day’s worth of content focused on this emerging threat, and the... Read More
Topics: Random Bit Generators
We’ll take a close look at issues related to the design and validation of entropy sources and random bit generators, including new 800-90B requirements.
Topics: Embedded Encryption and Industry-Vertical Applications
We’ve created a day of content focused on three areas where secure embedded encryption is crucial: PIV, authentication and identity technologies, communications devices, and the... Read More
Topics: Open Source Cryptography
OpenSSL is the most widely used encryption software library in the world, but community efforts are required to fend off threats to its security and... Read More
Topics: Cryptographic Technology
Taking certification requirements as a starting point, ICMC will survey a range of technological solutions covering entropy sources, PKI management, physical security, and countermeasures against... Read More
Topics: Global Validation
ICMC will continue its strong focus on validation programs with reports from both North American and international verification bodies, efforts toward international validation standards, and... Read More