We could not find any results for:
Make sure your spelling is correct or try broadening your search.
Share Name | Share Symbol | Market | Type | Share ISIN | Share Description |
---|---|---|---|---|---|
Tern Plc | LSE:TERN | London | Ordinary Share | GB00BFPMV798 | ORD 0.02P |
Price Change | % Change | Share Price | Bid Price | Offer Price | High Price | Low Price | Open Price | Shares Traded | Last Trade | |
---|---|---|---|---|---|---|---|---|---|---|
0.07 | 2.04% | 3.50 | 3.30 | 3.70 | 3.75 | 3.50 | 3.55 | 4,031,639 | 15:03:56 |
Industry Sector | Turnover | Profit | EPS - Basic | PE Ratio | Market Cap |
---|---|---|---|---|---|
Finance Services | 66k | -10.45M | -0.0269 | -1.30 | 13.6M |
Date | Subject | Author | Discuss |
---|---|---|---|
14/8/2018 12:26 | Only an idiot would think that a NOMAD walking is a positive fact. | loughton | |
14/8/2018 12:15 | last one for now: andrbea 19 Jul '18 - 08:24 - 110023 Good video about Oracle's Key Vault (Nov 2017) eg diagrams at 1m20s and 3m50s (diagram of the OKV) Topic: centralized security of keys at a datacenter keywords: key management/key audits encryption keys/database/file server wallet management/credentia andrbea 19 Jul '18 - 08:30 - 110025 The HSM vendors currently integrated with Oracle Key Vault are: SafeNet Luna SA 7000 and Thales nShield Connect 6000+. ... so Luna is omnipresent, eg IBM Cloud now uses Gemalto’s SafeNet Luna HSM technology for its newly released IBM Cloud HSM 7.0. /// IBM Security Key Lifecycle Manager and SafeNet Luna Network HSM Gemalto's Luna already interfacing with DA's Keyscaler: Device Authority’s KeyScaler technology is using Gemalto’s SafeNet Luna HSM to enable customers to achieve their IoT strategy and ultimately increase the pace of IoT adoption,” said Todd Moore, SVP, Encryption Products, | andrbea | |
14/8/2018 12:14 | on 'key management' mudbath 109378 That is another humdinger kkrriiss2 "Patients and practitioners alike require a level of assurance that the technology being implemented is secure, and that all and any data being transferred is safe from compromise. Encryption, for example, with strong key management is fundamental to preserving the confidentiality of data stored on, and shared by, medical devices. Thales’s recently announced partnership with Device Authority will offer this assurance, authenticating any new device hardware, establishing a root of trust and identity of any devices on the network, and providing managed end-to-end encryption to ensure the integrity of the data upon which they rely." Penned only last Wednesday by Jon Geater | CTO, Thales e-Security. | andrbea | |
14/8/2018 12:02 | Hmm, The poster posing as a major shareholder on the other thread (you know - the one who describes themselves as a 'Chartered Accountant'), does make me smile - apparently Tern's stock has been improved in the market due to the announcement of Allenby Capital as Advisor and Joint Broker. I'm sure that Allenby will have been introduced through the most august of routes - but isn't it rather unfortunate that the recommendation may have come via that old rascal Angus (he of the infamous paucity of DA's (Nee Cryptosoft) order pipeline)? After all those awfully nice Allenby chaps have 'done it' for Angus in the past: Ah the splendour that was DLM........What could possibly go wrong? DYOR M | maca1212 | |
14/8/2018 12:00 | Towards billions of keys? Billions and billions of encryption keys served The way to protect sensitive data is via encryption, and the way to keep encryption granular is to use unique keys. The more people who have access to a particular encryption key, the greater the possibility data can be breached. If we serve more keys, then fewer people have access to each individual key. Which is what we want if we are to boost security. So if we're protecting exabytes of data, and this is growing rapidly, it seems logical that the number of keys we'll need, maybe not this instant but someday soon enough, will be in the billions. Static key managers top out in the single-digit millions. To seriously consider protecting big data and IoT sources, we need dynamic key servers. | andrbea | |
14/8/2018 11:59 | Que? emeraldzebra14 Aug '18 - 11:22 - 29808 of 29808 (Filtered) 0 0 0 emeraldzebra14 Aug '18 - 11:58 - 29810 of 29810 (Filtered) | loughton | |
14/8/2018 11:57 | A trading update would be very welcome at Device Authority | sweepie2 | |
14/8/2018 11:45 | Good support at 20p range but I dread to think where it will go if it fails. | 7rademark | |
14/8/2018 11:27 | Que? emeraldzebra14 Aug '18 - 11:22 - 29808 of 29808 (Filtered) 0 0 0 | loughton | |
14/8/2018 11:26 | A good read eg on page 11 of 24 (download the pdf) The lifecycle of encryption keys The keys that are used for data encryption, regardless of the specific encryption technique, will have a lifecycle, much of this driven by regulatory compliance. For example, PCI requires the Data Encryption Keys (DEKs) to be rotated (resulting in the rekeying of the data) on a consistent basis (typically every 24 months). The impact of rotating data encryption keys can be significant, possibly even resulting in application downtime. You need to determine what the key rotation requirements are for your business, capture and communicate those up front, and then drive awareness around the impact it will have on the encryption techniques chosen for the applications and databases. A ‘rekey event’ should never be a surprise to the business. Having everyone understand the necessity and the associated effort required to rotate keys, and the options that exit to assist in reducing or even eliminating downtime, will make ensure that this is a well understood and planned exercise. | andrbea | |
14/8/2018 11:22 | dry up Loooooni you smelly old failure. ! | emeraldzebra | |
14/8/2018 10:50 | I think we all know that him and old Smokie are the same person. Care in the community failed again. | redhammy |
It looks like you are not logged in. Click the button below to log in and keep track of your recent history.
Support: +44 (0) 203 8794 460 | support@advfn.com
By accessing the services available at ADVFN you are agreeing to be bound by ADVFN's Terms & Conditions