Case Study

Detecting Anomalies in Key Management Systems

Large scale enterprise networks often use enterprise key management (EKM) platforms for unified management of encryption keys.  Monitoring access and usage patterns of EKM systems may enable detection of anomalous (possibly malicious) activity in the enterprise network not detectable by other means.

Acknowledgement of Country

We acknowledge the many Traditional Custodians of Country throughout Australia and honour their Elders past and present.

We respect their deep enduring connection to their lands, waterways and surrounding clan groups since time immemorial. We cherish the richness of First Nations Peoples’ artistic and cultural expressions.

We are privileged to gather on this Country and through this website to share knowledge with future generations.