Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced tab and looking under the security settings for "Use TLS 1.1" and "Use TLS 1.2". Ensure these are turned on (checked). Doing so will enable your browser to support a higher quality of encryption on this and other websites. You will still be able to browse this site without turning on support for TLS 1.1 and 1.2, but we will have to use a lower level of encryption to accomodate you. See this question on Stack Exchange's Superuser forum from 2011 for more details keeping in mind the comments about TLS 1.2 non-support were made many years ago, and things have changed since then.

If the support for better cryptography has been turned on for your browser, thank you, and you can safely ignore this advisory.

Browser Security Alert

Blog


Is Runaway Encryption Sabotaging Your Security?

Sometimes, an organization’s biggest information security headaches come not from the ill-intentioned, but from employees who are trying to do the right thing. As companies and government agencies create and exchange unprecedented volumes of sensitive data, uncontrolled or “runaway” encryption is becoming a serious concern for organizations around the world.

Client-Side Encryption vs. End-to-End Encryption: What’s the Difference?

In a world of proliferating cyber threats and constant data exchange, encryption continues to gain visibility as the single most important tool for long-term information security. In fact, a recent report from Forrester named data encryption as one of the top global cybersecurity trends for 2017. Now more than ever, individuals and businesses are looking for ways to use encryption to keep their sensitive information safe from data thieves, spies, and other cyber threats.

Understanding Security And The Internet of Things

The DDoS attack that crippled such major sites as Twitter, Paypal, Netflix and Reddit last week shifted the world's attention to the so-called Internet of Things (IoT).

Security experts have discussed the IoT as a target for some time, but the coordinated assault against Dyn, one of several companies hosting the the Domain Name System (DNS), brought the dangers into clearer focus.

To better understand what we're dealing with, a deeper dive into the IoT is necessary. Here's a look at how it works, where the vulnerabilities are, and what can be done to improve the security behind the technology.

EU Data Security: Three Elements of Uncertainty

Companies responsible for complying with the European Union's General Data Protection Regulation (GDPR) have a lot of uncertainty to process. From Brexit to the demise of Safe Harbor and the unfolding Digital Single Market (DSM), questions abound over how to proceed with compliance efforts.

What follows is a breakdown of these developments and a suggestion for the way forward.

The Yahoo Breach: Four Lessons

If the Yahoo data breach has taught us anything, it’s that no enterprise is immune to compromise.

How PKWARE Became A Data Encryption Company

When PKWARE comes up in conversation, people often make the following comments:

  • 1.) I didn’t know PKWARE was still around!
  • 2.) Encryption? I thought PKWARE was about .ZIP file technology?

Thing is, this company has been going strong for a long time, providing encryption and compression solutions to more than 30,000 enterprise customers around the world. Our Smartcrypt technology has become a staple for organizations in the financial services, government, healthcare, retail, and manufacturing sectors.

For those unfamiliar with PKWARE’s history and trajectory, the overview below should clear up a few things.

Clinton, Encryption And The Trust Problem

Last week, presumptive Democratic Presidential Nominee Hillary Clinton unveiled a sprawling technology plan that included provisions for encryption and broader cybersecurity.

On paper it looks sensible. But there’s a massive trust problem -- not just for Clinton, but for the Federal Government as a whole.

What Does Brexit Mean For Data Security Laws?

The UK’s vote to break away from the European Union raises many questions about the future of the myriad data security laws affecting the entire continent.