From 7ac77104ff983bba3faf6acad89a55e2135304ce Mon Sep 17 00:00:00 2001 From: Aapeli Date: Fri, 17 Jan 2020 12:59:24 +0100 Subject: [PATCH 1/2] Start on crypto & sec services page --- content/services/cryptography-and-security.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 content/services/cryptography-and-security.md diff --git a/content/services/cryptography-and-security.md b/content/services/cryptography-and-security.md new file mode 100644 index 00000000..4f0bda73 --- /dev/null +++ b/content/services/cryptography-and-security.md @@ -0,0 +1,16 @@ +--- +name: "Cryptography and security" +callToActionText: "CTAT" +--- + +## Cryptography: essential but challenging + +Cryptography lies at the core of practically all modern day applications, guaranteeing the integrity and confidentiality of data, as well as the authentication of those accessing data and services. With the rise of coordinated industrial espionage by rivals, systematic hacking efforts by nation-state actors, and highly costly anonymous ransomware attacks; we increasingly depend on highly sophisticated cryptographic protocols to safeguard ourselves from these bad actors. + +It is imperative then that the implementations we rely on are correctly used and bug-free, and that the protocols are appropriate and proved to be secure. Given the fragile nature and ease of misusing cryptography, even the most basic application of well known, standardised protocols is often difficult and requires an expert review to confirm the correct implementation. + +When one ventures beyond the landscape of the ubiquitous and well studied protocols, the challenge of correctly using cryptography becomes orders of magnitude more difficult. Navigating the world of novel protocols, and understanding the strengths and weaknesses of different primitives is an extremely challenging endeavour. + + + +Correctly implemented cryptography is imperative for modern day applications, protecting \ No newline at end of file From 9926f9d031d94d4472c4948071a6bd21e7ff54a4 Mon Sep 17 00:00:00 2001 From: Aapeli Date: Fri, 17 Jan 2020 13:10:30 +0100 Subject: [PATCH 2/2] Work on c&s page --- content/services/cryptography-and-security.md | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/content/services/cryptography-and-security.md b/content/services/cryptography-and-security.md index 4f0bda73..3f0d2549 100644 --- a/content/services/cryptography-and-security.md +++ b/content/services/cryptography-and-security.md @@ -11,6 +11,17 @@ It is imperative then that the implementations we rely on are correctly used and When one ventures beyond the landscape of the ubiquitous and well studied protocols, the challenge of correctly using cryptography becomes orders of magnitude more difficult. Navigating the world of novel protocols, and understanding the strengths and weaknesses of different primitives is an extremely challenging endeavour. +## Security: the grand view +Security, although it involves a good dose of cryptography, involves more than the application, analysis, and application of protocols and primitives. Sophisticated security modelling and analysis is required to guarantee the safety of entire systems. -Correctly implemented cryptography is imperative for modern day applications, protecting \ No newline at end of file +- Attack surface/vectors +- Threat model +- Risk assessment +- Human error +- Key management +- Whatever whatever whatever + +### We can help + +Whether you're trying to use TLSv1.3 for secure API calls or developing your own novel cryptocurrency, our team of experienced consultants can give you tailored aid in implementing and verifying your cryptographic needs. With deep knowledge of cryptographic environments and existing cryptosystems, and a thorough understanding of the individual primitives underpinning those systems, we can expedite your software delivery while simultaneously making sure the systems you rely on for business critical needs are safe and secure from prying eyes. \ No newline at end of file