NIST 800-171 Requirements for Validated Cryptographic Modules
SafeLogic and Kratos Defense collaborated to assemble the authoritative guide to encryption prerequisites for NIST 800-171, and by extension, CMMC.
On Demand - Crypto for Constrained Devices: A Talk with Whitfield Diffie
RSA Conference 2014 featured a fireside talk, hosted by SafeLogic founder Ray Potter with advisor Whit Diffie.
FedRAMP Requirements for Validated Cryptographic Modules
SafeLogic and Coalfire published a joint whitepaper addressing FedRAMP dependencies on FIPS 140 validation.
‘FIPS Inside’ – A Strategic Advantage for FIPS 140 Validation
Despite the FUD published by consultants and testing labs that are in favor of wider project scopes, higher pricetags, and shorter shelf-lives, ‘FIPS Inside’ can be a huge win for vendors and is explained in this paper.
Top 10 Reasons to Choose SafeLogic Over Open Source
We assembled the most popular reasons reported by our customers for selecting SafeLogic’s encryption modules rather than their open source counterparts.
SlideShare – Amped for FedRAMP
This deck was developed alongside Intel Security for MISTI’s Cloud Security World 2015, explaining the FedRAMP program and the role of validated encryption for Cloud providers.
On Demand - FIPS 140: On the Precipice of Irrelevance?
In 2020, the International Cryptographic Module Conference (ICMC) went fully virtual. SafeLogic founder Ray Potter embraced the format with a presentation challenging the status quo.
Champion Research Infographic on the FIPS 140 Queue
SafeLogic worked with Champion Research on a survey to shed light on the real-life experiences in the FIPS 140 validation process.
SlideShare – Don't Touch That Dial: How Smart Thermostats Have Made Us Vulnerable
SafeLogic Founder Ray Potter's slide deck from the 2015 RSA Conference, speaking alongside researcher Yier Jin about IoT vulnerabilities.
Addressing the Encryption Requirements of the Common Criteria Protection Profiles for Mobility
This whitepaper discusses how CryptoComply can help vendors meet the Mobile Device Protection Profile (MDPP) and the Mobile Device Management Protection Profile (MDMPP).
Chapters 3 and 4 from FIPS 140 Demystified: An Introductory Guide for Vendors
Written by SafeLogic co-founders Wes Higaki and Ray Potter. This book is available on Amazon.com.
HIPAA Requirements for Encryption
This whitepaper describes the role of encryption in HIPAA regulation and discusses the advantages of CryptoComply in context.
FISMA Requirements for Validated Cryptographic Modules
This whitepaper explores the relationship between CryptoComply and FISMA. Download to see the mapping of CryptoComply features to FISMA / SP 800-53 security controls.
SlideShare – Unsafe Harbor: Will Your Encryption Weather the Storm?
The (ISC)2 Security Congress featured discussion on healthcare data security and encryption by SafeLogic's founder.
On Demand - Certification Hurdles on the Road to U.S. Federal Contracts
SafeLogic's VP of Communications, Walt Paley, presented key compliance information for vendors new to the Public Sector on a webinar for AFCEA Silicon Valley Chapter.