Is it possible to configure the Java Cryptography Architecture to use Azure Key Vault as a crypto provider?

We are currently using ForgeRock as an Identity and Access Management solution, this is being hosted on Infrastructure-as-a-Service machines in Azure, i.e. Virtual Machine Scale Sets. There is a requirement to protect the pr… Continue reading Is it possible to configure the Java Cryptography Architecture to use Azure Key Vault as a crypto provider?

PRNG Weakness Reflects Poorly on Government Crypto Certification

Security researchers discovered that the pseudorandom number generator that underpins cryptographic operations in Fortinet appliances and products from other 11 other vendors rendered encrypted traffic vulnerable to snooping for years. The affected pro… Continue reading PRNG Weakness Reflects Poorly on Government Crypto Certification

DUHK Attack Exposes Gaps in FIPS Certification

The DUHK Attack leverages a 20-year-old random number generator flaw to recover private keys. More pertinent, researchers said, is that the flaw exposes gaps in the FIPS certification process. Continue reading DUHK Attack Exposes Gaps in FIPS Certification