Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced tab and looking under the security settings for "Use TLS 1.1" and "Use TLS 1.2". Ensure these are turned on (checked). Doing so will enable your browser to support a higher quality of encryption on this and other websites. You will still be able to browse this site without turning on support for TLS 1.1 and 1.2, but we will have to use a lower level of encryption to accomodate you. See this question on Stack Exchange's Superuser forum from 2011 for more details keeping in mind the comments about TLS 1.2 non-support were made many years ago, and things have changed since then.

If the support for better cryptography has been turned on for your browser, thank you, and you can safely ignore this advisory.

Browser Security Alert

Blog


Government Agencies Get Their Cybersecurity Marching Orders

After months of delays, the Trump administration has issued its first executive order on cybersecurity, signaling the direction that the federal government’s new strategy will take. The order addresses three broad topics: the security of federal networks, protections for critical infrastructure, and cybersecurity for the general public. Among its calls to replace outdated technology and to create a more capable cybersecurity workforce, the order contains one directive that will make an immediate difference in how the government manages its cybersecurity programs.

What’s the Real Cost of a Data Breach?

Data breaches are simply a fact of life. Businesses in every industry, in every country, are attacked by data thieves and malicious insiders on a daily basis. As pervasive as they are today, cyber threats will only grow more severe as time goes on—each newly-developed way to communicate or do business online creates new forms of sensitive data that hackers, industrial spies, and state-sponsored operatives are ready to exploit.

Data Protection Officer: Do You Need One?

Data protection is no longer the domain of the IT manager.

Enterprise organizations are dealing with larger data volumes, more data-dependent business models, and more unpredictable cyber threats than ever before. These pressures, along with new regulations passed in response to them, have moved the conversation about data protection from the IT department to the boardroom. One of the most visible signs of this shift is the emergence of a new role at corporations and government agencies: the data protection officer.

Brexit and GDPR: What to Expect

When it rains, it pours.

After the European Commission adopted the GDPR in April 2016, businesses around the world scrambled to make sense of the new data security law and the obligations it imposed. And then, less than two months later, came the Brexit referendum and the UK’s decision to leave the EU.

Organizations who hadn’t yet come to terms with the GDPR were suddenly faced with the prospect of creating not one, but two new data protection strategies—one to meet the EU regulations, and another to comply with whatever rules would apply in the UK after its exit from the EU was complete. It was hardly surprising when companies in North America and elsewhere began to consider leaving the European market entirely, rather than dealing with the complexity and uncertainly that the legal developments had created.

A Backdoor by Any Other Name

“I love strong encryption. Strong encryption is a great thing.”

That’s what FBI Director James Comey had to say earlier this month in his keynote speech at a Boston cybersecurity conference. The quote might have surprised a few people, given last year’s confrontation between the FBI and Apple over cell phone encryption, and Comey’s public warnings that the FBI is increasingly unable to access encrypted information on phones, laptops, and other devices. Has the Director had a change of heart?

New York and the Future of Cybersecurity Legislation

Now that the first real cybersecurity law in US history is on the books, can we expect to see more of the same?

New York’s cybersecurity law for the financial services industry, 23 NYCRR 500, took effect on March 1. The law is making headlines not because it creates a heavy new burden for compliance, but because it takes a broader view of information security than any previous state or federal law. As a highly visible attempt to set priorities and minimum standards, the New York regulations have the potential to influence the long-term direction of cybersecurity legislation in the United States.

PKWARE Earns a Spot in the Cybersecurity 500

We're pleased to announce that once again, PKWARE has earned recognition as one of the world's most influential and innovative cybersecurity companies. The latest edition of the Cybersecurity 500, published by Cybersecurity Ventures, ranks PKWARE among the top information security firms worldwide.

GDPR Is a Year Away: Will You Be Ready?

In May 2018, the European Union’s new General Data Protection Regulation will take effect, forcing companies that do business in the EU to comply with strict new standards for data privacy and security. While it won’t have the force of law for another 14 months, the GDPR is already influencing data protection strategies around the globe.