BlindHash Cyber Protection is similar to an HSM in some ways -- both are an additive layer of security to protect crucial secrets, even if an attacker is able to access the database. But the BlindHash approach is quite different. Instead of playing the same game of trying to hide a tiny secret key from an attacker, we protect secrets with our patented data pool model. With BlindHash, an attacker would have to physically steal the entire data pool off our servers. Just based on the physics of the size of the pool versus the speed of the network, this process becomes easy to detect and easy to defend against.
For years, large sized banks and corporations have been using Hardware Security Modules (HSMs) to help perform their secure cryptographic operations. HSMs are certified by NIST under FIPS 140-2, which is a set of standards and requirements governing the design of the hardware and software components of the HSM. FIPS 140-2 can provide some assurance that the overall system, including hardware tamper resistance, cryptographic primitives, and even user management and configuration, are designed to resist intrusion. HSMs provide a system to generate and store secret keys, and perform cryptographic operations using those keys inside a protected enclave. In short, an HSM holds secret keys inside a closed-source “black box” which in theory an attacker cannot access.
FOR IMMEDIATE RELEASE
As 2018 sets up to be a record year of growth for the eCommerce industry, it also sets itself up for another record; increased cyber attacks. Cyber criminals are naturally attracted to markets where they see opportunity and vulnerability and the eCommerce industry fits that profile. According to Richard Mellor, former vice president of loss prevention for the National Retail Federation, “New ideas, concepts, and schemes are developed every day by cybercriminals, and their sophistication often includes virtual escape methods. Therefore, it will be even more important for loss prevention professionals, IT teams and cybersecurity specialists within a retail organization to find the right partners to protect their brand integrity.” Retailers will be faced with finding a balance between capitalizing on the opportunity of increased sales while also making investments that help ensure the protection of their online shoppers’ personal data and the their brand’s reputation.