Protecting the world's information...
must evolve as new threats, risks and opportunities emerge. To stay in front of the quick-paced security landscape, PKWARE's in-house experts regularly offer blogs covering best practices, fresh resources and the trends behind the headlines. The blogs are meant to spark conversation, so please add your comments, share competing thoughts or pass along topics you'd like us to take on.
Apple Phone Case Exposes Stubborn Skills Gap
Like many of us in the cybersecurity industry, I paid close attention to the recent fight between the FBI and Apple over an encrypted phone.
Safe and Sound
(When No One is Paying Attention)
The worlds of fantasy and security have collided twice recently, once in practice and the other in principle.
Why We Are Teaming Up with Google, Facebook and a Few of Our Rivals
Protecting the world’s information can create strange bedfellows. But sometimes it’s worth the unexpected allegiances with potential rivals or social media companies in an effort for everyone to get a better grasp on data security.
First Principles of Data Security: The 4 Key Questions You Need to Be Asking
Looking at the volume of recent data breaches, it appears that malicious hackers are becoming increasingly savvy. Maybe. But the more likely cause is that miscreants are walking through doors left open by a legacy of bad security practices – or they are working with people already inside with access to sensitive data.
Nerds on the Attack: The Most Important Shot in the New Crypto Wars
The nerds have shot back. For those of us who remember the “crypto wars” during the Clinton Administration, it was the technical takedown of bad encryption plans for the Clipper chip by security leaders which acted as data security discussion’s denouement. When cracking open encryption was proven at the technical level to be bad practice for everyone – government, law, business, private citizens – it was time for the snooping and surveillance advocates to take their ball and go home. Ever since, we’ve enjoyed the ability to implement encryption for better privacy and stronger business security. You can even draw a link from stronger crypto to the great tech companies that popped up and thrived before and after the Dot Com Bubble.
What’s the Cost of Encryption in England? A Big Mac Index for Security
After all the buzz and blimey out of London Tech Week and Interop London 2015, I was ready for a Big Mac. Typical American, right! The Big Mac I’m thinking of is more related to economics than any McDonald’s pink slime concoction.
The Invisible Cities of Data Security Curiosities: Report from Gartner Security and Risk Summit 2015
Between flights from D.C. to New York to Milwaukee to London, I wanted to share a kind of wild anecdote from this week’s Gartner Security and Risk Summit.
How to Politely Talk Politics When it Comes to Enterprise Security
The other day, I broke a social rule among polite company. I talked politics.