Protecting the world's information...
must evolve as new threats, risks and opportunities emerge. To stay in front of the quick-paced security landscape, PKWARE's in-house experts regularly offer blogs covering best practices, fresh resources and the trends behind the headlines. The blogs are meant to spark conversation, so please add your comments, share competing thoughts or pass along topics you'd like us to take on.
Building Trust: The Larger Problem Caused by Hacks [Episode 6 Thieves, Snoops & Idiots]
In Episode 6 of “Thieves, Snoops and Idiots”, our hosts Matt Little, VP of Product Development, and Justin Kern, PR and Communications Human, talk about the perilous state of security on software, hardware and open source. We also introduce the TrustTron 6000, a pretend protection device pulled from scrap computer parts.
The Lifestyle of Encryption, Enriched and Famous
What’s next, a White House roundtable on asymmetric key management?
The Quiet Millions
Who Have Not Been Hacked
There are people, businesses and government agencies who have not been hacked.
Thieves, Snoops and Idiots: A New Series to Make Sense of Security Threats
The world of data protection is under attack from three main threats: thieves, snoops and idiots. Well, that's how we categorize internally the risks facing business information security. Starting this week, we've started to broadcast what we mean by thieves, snoops and idiots – and what both business leaders and security developers can do about them.
Four Disruptive Hacks to Come in 2015
While out in Maryland to talk security with a few government contractors, I realized I was stopped at the intersection of “Snowden River Parkway” and “Broken Land Drive.” The Parkway is named for a Revolutionary War sea captain and not Edward, the thorn in the side of the U.S. government. The coincidence and irony from the intersection of Snowden River Parkway and Broken Land Drive weren’t lost on the handful of security architects and CISOs I talked with later that day in nearby Fort Meade.
Grin and Bear It:
A New Security Attitude for 2015
Data security is a grim business, especially of late. There’s an expected seriousness when you’re handling sensitive data, stacks of information and the cold action of computing. But isn’t it time we cracked a smile?