Protecting the world's information...
must evolve as new threats, risks and opportunities emerge. To stay in front of the quick-paced security landscape, PKWARE's in-house experts regularly offer blogs covering best practices, fresh resources and the trends behind the headlines. The blogs are meant to spark conversation, so please add your comments, share competing thoughts or pass along topics you'd like us to take on.
What’s the Cost of Encryption in England? A Big Mac Index for Security
After all the buzz and blimey out of London Tech Week and Interop London 2015, I was ready for a Big Mac. Typical American, right! The Big Mac I’m thinking of is more related to economics than any McDonald’s pink slime concoction.
The Invisible Cities of Data Security Curiosities: Report from Gartner Security and Risk Summit 2015
Between flights from D.C. to New York to Milwaukee to London, I wanted to share a kind of wild anecdote from this week’s Gartner Security and Risk Summit.
How to Politely Talk Politics When it Comes to Enterprise Security
The other day, I broke a social rule among polite company. I talked politics.
Data Protection – Put Your Money Where Your Doubt Is
I have some good news and some bad news on encryption. First, the good news: encryption is all over the place! The bad news? Encryption isn’t really all over the places data needs it to be.
Asking for the Future, Now – Encryption, RSA & the LawThe future is now for encryption. After months of data protection paranoia, the appetite is growing for an evolved, stronger version of encryption to solve today’s big security problems.
The Key that Unlocks Esperanto
As any student or traveler can attest, learning a new language is hard. How about making one up?
Encryption and the Politics of Confusion
A couple of elected officials are finally learning about encryption. In the process, they’ve unleashed resolutions that are sometimes comical and more often chilling.
Protecting Files, Phones & Grandma – A Simple Security Tip Sheet
At first I thought it was a joke for my brother to offer me a ransom to retrieve his phone. As it turned out, everyone in his contact list received the ransom texts and calls – because my brother’s phone had been stolen. In rectifying the stolen phone, local police said they were dealing with a few of these same phone ransoms a week. What stung the most was that my brother could have set up a few security steps at the start to prevent the whole situation.