{"id":51195,"date":"2023-03-27T17:26:04","date_gmt":"2023-03-27T17:26:04","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-tech\/drive-pervasive-encryption-boosts-key-management"},"modified":"2023-03-27T17:26:04","modified_gmt":"2023-03-27T17:26:04","slug":"drive-to-pervasive-encryption-boosts-key-management","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/","title":{"rendered":"Drive to Pervasive Encryption Boosts Key Management"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta054b9d9544723d0\/62e21e04ecc54c6cacd81fdc\/encryption_4_750px.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>As cloud infrastructure and compliance regulations become more complicated, companies are looking to simplify data security by adopting more pervasive encryption of sensitive data and consolidating key management into a single repository or service.<\/p>\n<p>On March 22, email and file security firm Virtru became the latest data-protection firm to offer customers a single vault for key management, announcing a private keystore that works with Google Workspace, Google Cloud, and the company&#8217;s other products. The product manages encryption keys, configures policies, and allows audits of access to encrypted data.<\/p>\n<p>Virtru had already offered encryption for email and files stored in the cloud, but the sensitivity of data and need for complying with government requirements led customers to ask for a &#8220;hold your own key,&#8221; or HYOK, capability, says Mike Morper, senior vice president of product at Virtru.<\/p>\n<p>&#8220;We have customers that have come to us, who &#8230; want to insure absolutely no entity other than the intended recipient has access to [a particular piece of] information,&#8221; Morper says. &#8220;We first started hearing this rooted in a lot of data-sovereignty conversations, particularly with some of our customers in Europe &#8230; and it was paramount to them that they would have the ability to manage their own private keys.&#8221;<\/p>\n<p>As companies increasingly look to protect data with pervasive encryption, consolidated key management is coming into its own. Currently, 62% of companies have an encryption policy that is consistently applied, up from 50% in 2021, but more than half of companies still have trouble identifying all sensitive data, and 59% of businesses find key management to be very painful, according to <a href=\"https:\/\/www.entrust.com\/c\/global-encryption-trends-study\" target=\"_blank\" rel=\"noopener\">Entrust&#8217;s 2022 Global Encryption Trends Study<\/a>.<\/p>\n<p>Moreover, a set of headaches \u2014 including managing keys, limiting who can access data, and auditing that access \u2014 have only grown more severe as companies need to comply with privacy regulations from multiple countries and ensure the security of data across multiple clouds, says Kevin McKeogh, vice president of product management for data protection solutions at Entrust.<\/p>\n<p>&#8220;Encrypting data is easy \u2014 managing the keys that are used to encrypt the data is what becomes increasingly challenging for organizations as they scale operations,&#8221; he says. &#8220;With a growing volume of data now processed across distributed systems \u2014 on-premises and in multicloud environments \u2014 organizations need to maintain control of the keys to ensure data is protected and available to the applications that need to use the data, and to stay compliant to regulations.&#8221;<\/p>\n<h2 class=\"regular-text\">Key Management Plus Granular Access Control<\/h2>\n<p>Take the move to multiple clouds \u2014 a significant operational challenge for data protection systems. By 2024, international data residency and privacy requirements will push more than 40% of organizations to adopt a third-party multicloud key management as a service (KMaaS) offering instead of relying on the bespoke key management services offered by many cloud providers, stated a <a href=\"https:\/\/cpl.thalesgroup.com\/resources\/encryption\/selecting-the-right-key-management-as-a-service-in-the-cloud-kmaas-report\" target=\"_blank\" rel=\"noopener\">Gartner report on KMaaS offerings<\/a> commissioned by Thales, a data-protection provider.<\/p>\n<p>The challenge of managing encrypted data, permissions, and access lists across multiple clouds and their associated key management systems has resulted in at least half of companies encrypting less than 40% of their sensitive data in the cloud, according to the &#8220;<a href=\"https:\/\/cpl.thalesgroup.com\/data-threat-report\" target=\"_blank\" rel=\"noopener\">2022 Thales Data Threat Report<\/a>.&#8221;<\/p>\n<p>&#8220;The typical enterprise has at least five different key managers deployed, so key sprawl is an issue,&#8221; says Todd Moore, vice president of encryption products at Thales. &#8220;This complicates things like key rotation and retiring keys. The best practice is to have one centralized key management platform that can support the vast majority of your key management operations.&#8221;<\/p>\n<p>A central vault for sensitive keys can help make even complex situations simpler. This year, for example, at least 81% of companies are expected to use multiple cloud infrastructures, up from 60% in 2022, according to <a href=\"https:\/\/www.hashicorp.com\/blog\/hashicorp-state-of-cloud-strategy-survey-2022-multi-cloud-is-working\" target=\"_blank\" rel=\"noopener\">Forrester Research&#8217;s &#8220;Unlocking Multicloud&#8217;s Operational Potential&#8221; report<\/a> commissioned by secrets management firm HashiCorp. For those companies, encrypting data across cloud services and using a centralized vault to manage access to that data through keys allow for more control.<\/p>\n<p>In addition, companies that rely on a single cloud provider&#8217;s key management solution may be at greater risk. Privacy and data-protection regulations, such as the European General Data Protection Regulation (GDPR) or the Payment Card Industry&#8217;s Data Security Standard (PCI-DSS), explicitly require \u2014 or heavily imply \u2014 that encrypting sensitive data is necessary and that self-custody of keys is preferred, says Andy Manoske, principal product manager for cryptography and security at HashiCorp.<\/p>\n<p>&#8220;This is especially the case if data sovereignty requirements attempting to protect against a privileged adversary within a client&#8217;s cloud service infrastructure are at play,&#8221; he says. &#8220;While an adversary may not be able to compromise that key management system, they could render it inoperable if they have privilege within a single cloud hosting both data encryption and key management.&#8221;<\/p>\n<h2 class=\"regular-text\">Private Keystore or Key Management as a Service?<\/h2>\n<p>While a private keystore is a solution, it is not the only one. Key-management services that provide HYOK can satisfy government regulations and business security requirements, while still giving companies the expertise and support they need to manage a complex task. Keys need to be protected, but defenders must understand the company&#8217;s threat model and what types of attacks are likely in order to best select the appropriate encryption technologies.<\/p>\n<p>Deploying encryption and maintaining a private keystore requires some deep expertise within a company, Manoske says.<\/p>\n<p>&#8220;Private keystores usually provide flexibility in how keys are retrieved and used for cryptography \u2014 a flexibility usually necessary when deploying cryptography within high-performance applications with significant automation,&#8221; Manoske says. &#8220;This flexibility comes at the cost of usually requiring more sophistication from the defender in protecting against side channel attacks \u2014 attacks that &#8216;go around&#8217; the mathematical protections of cryptography to tamper with or steal keys.&#8221;<\/p>\n<p>While a company can retain ownership of critical keys, some KMaaS offerings can simplify the business&#8217; data security and provide necessary capabilities, such as access control and auditability, says Virtru&#8217;s Morper.<\/p>\n<p>&#8220;That&#8217;s the hard part, and frankly, probably where the preponderance of adoption and friction come into play,&#8221; he says. &#8220;So it really starts to become a balance for organizations. It&#8217;s a security-policy decision and a business decision they need to make \u2014 what level of friction is appropriate and against what degree of risk?&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/drive-pervasive-encryption-boosts-key-management\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Key vaults, aka key management as a service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/drive-pervasive-encryption-boosts-key-management\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51195","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Drive to Pervasive Encryption Boosts Key Management 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Drive to Pervasive Encryption Boosts Key Management 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-27T17:26:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta054b9d9544723d0\/62e21e04ecc54c6cacd81fdc\/encryption_4_750px.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Drive to Pervasive Encryption Boosts Key Management\",\"datePublished\":\"2023-03-27T17:26:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/\"},\"wordCount\":1032,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blta054b9d9544723d0\\\/62e21e04ecc54c6cacd81fdc\\\/encryption_4_750px.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/\",\"name\":\"Drive to Pervasive Encryption Boosts Key Management 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blta054b9d9544723d0\\\/62e21e04ecc54c6cacd81fdc\\\/encryption_4_750px.jpg\",\"datePublished\":\"2023-03-27T17:26:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blta054b9d9544723d0\\\/62e21e04ecc54c6cacd81fdc\\\/encryption_4_750px.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blta054b9d9544723d0\\\/62e21e04ecc54c6cacd81fdc\\\/encryption_4_750px.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drive-to-pervasive-encryption-boosts-key-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Drive to Pervasive Encryption Boosts Key Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Drive to Pervasive Encryption Boosts Key Management 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/","og_locale":"en_US","og_type":"article","og_title":"Drive to Pervasive Encryption Boosts Key Management 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-27T17:26:04+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta054b9d9544723d0\/62e21e04ecc54c6cacd81fdc\/encryption_4_750px.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Drive to Pervasive Encryption Boosts Key Management","datePublished":"2023-03-27T17:26:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/"},"wordCount":1032,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta054b9d9544723d0\/62e21e04ecc54c6cacd81fdc\/encryption_4_750px.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/","url":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/","name":"Drive to Pervasive Encryption Boosts Key Management 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta054b9d9544723d0\/62e21e04ecc54c6cacd81fdc\/encryption_4_750px.jpg","datePublished":"2023-03-27T17:26:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta054b9d9544723d0\/62e21e04ecc54c6cacd81fdc\/encryption_4_750px.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta054b9d9544723d0\/62e21e04ecc54c6cacd81fdc\/encryption_4_750px.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/drive-to-pervasive-encryption-boosts-key-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Drive to Pervasive Encryption Boosts Key Management"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51195"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51195\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}