Protecting the world's information...
must evolve as new threats, risks and opportunities emerge. To stay in front of the quick-paced security landscape, PKWARE's in-house experts regularly offer blogs covering best practices, fresh resources and the trends behind the headlines. The blogs are meant to spark conversation, so please add your comments, share competing thoughts or pass along topics you'd like us take on.
The Yahoo Breach: Four Lessons
If the Yahoo data breach has taught us anything, it’s that no enterprise is immune to compromise.
Security Reading Room: Oct. 3, 2016
A look at some of the security thought leadership content we’ve been reading this past week:
How PKWARE Became A Data Encryption Company
When PKWARE comes up in conversation, people often make the following comments:
- 1.) I didn’t know PKWARE was still around!
- 2.) Encryption? I thought PKWARE was about .ZIP file technology?
Thing is, this company has been going strong for a long time, providing encryption and compression solutions to more than 30,000 enterprise customers around the world. Our Smartcrypt technology has become a staple for organizations in the financial services, government, healthcare, retail, and manufacturing sectors.
For those unfamiliar with PKWARE’s history and trajectory, the overview below should clear up a few things.
Clinton, Encryption And The Trust Problem
Last week, presumptive Democratic Presidential Nominee Hillary Clinton unveiled a sprawling technology plan that included provisions for encryption and broader cybersecurity.
On paper it looks sensible. But there’s a massive trust problem -- not just for Clinton, but for the Federal Government as a whole.
What Does Brexit Mean For Data Security Laws?
The UK’s vote to break away from the European Union raises many questions about the future of the myriad data security laws affecting the entire continent.
GDPR Will Dominate 2016 European Legal Security Forum
A big focus of the 2016 European Legal Security Forum (July 12 at 155 Bishopsgate, London) is on the General Data Protection Regulation (GDPR), which will require companies doing business in the European Union to better secure how they collect, store, and use personal information by 2018.
In keeping with the law’s central concepts of “data protection by design” and “data protection by default,” organisations must build stronger data security into their products and services and follow strict guidelines on how personal data may be used. Failure to comply will carry severe penalties of up to 4% of a company’s annual turnover (gross revenue). The law provides specific rules for data processors -- businesses that collect or manage data on behalf of a data controller:
Key Management: Your Tales From The Trenches
Now that I’m settled in here at PKWARE, I’m going to do something I haven’t done since my journalist days: I’m going to interview people on a regular basis and work the feedback into a steady stream of analytical posts.
I’ll ask questions of my colleagues, for sure. But I’m also going to ask questions of people outside the company, particularly security practitioners who deal with the challenges our technology is designed to address.
This post is my opening salvo, an unscientific poll of sorts.
The DNC Hack: From Prediction To Reality
Among the 2016 cybersecurity predictions he made back in January, PKWARE CEO and President V. Miller Newton said a presidential campaign would be hacked before the November election.
That prediction has become reality, according to The Washington Post.