In his latest Forbes article, Vincent Berk explains that while cryptographic algorithms are “baked in” to every software program across our infrastructure, in most cases, information security professionals aren’t aware of what algorithms are being used or where. Berk believes that establishing a crypto-agility policy as an extension of how you manage security is an imperative. He also notes that the more you talk about crypto policy management, the better. It will take a community effort to help cryptography rise out of the application layer and become dedicated and managed by risk-tolerant policy. Read it here.