External hackers and insider threats. Customer expectations and government mandates.
Data protection is a complex challenge, and it demands attention at every level of an organization. PKWARE's in-house experts are here to help you stay up to date on best practices, emerging trends, and new resources for enterprise data security.
The Key that Unlocks Esperanto
As any student or traveler can attest, learning a new language is hard. How about making one up?
Encryption and the Politics of Confusion
A couple of elected officials are finally learning about encryption. In the process, they’ve unleashed resolutions that are sometimes comical and more often chilling.
Protecting Files, Phones & Grandma – A Simple Security Tip Sheet
At first I thought it was a joke for my brother to offer me a ransom to retrieve his phone. As it turned out, everyone in his contact list received the ransom texts and calls – because my brother’s phone had been stolen. In rectifying the stolen phone, local police said they were dealing with a few of these same phone ransoms a week. What stung the most was that my brother could have set up a few security steps at the start to prevent the whole situation.
Building Trust: The Larger Problem Caused by Hacks [Episode 6 Thieves, Snoops & Idiots]
In Episode 6 of “Thieves, Snoops and Idiots”, our hosts Matt Little, VP of Product Development, and Justin Kern, PR and Communications Human, talk about the perilous state of security on software, hardware and open source. We also introduce the TrustTron 6000, a pretend protection device pulled from scrap computer parts.
The Lifestyle of Encryption, Enriched and Famous
What’s next, a White House roundtable on asymmetric key management?
The Quiet Millions
Who Have Not Been Hacked
There are people, businesses and government agencies who have not been hacked.
Thieves, Snoops and Idiots: A New Series to Make Sense of Security Threats
The world of data protection is under attack from three main threats: thieves, snoops and idiots. Well, that's how we categorize internally the risks facing business information security. Starting this week, we've started to broadcast what we mean by thieves, snoops and idiots – and what both business leaders and security developers can do about them.
Four Disruptive Hacks to Come in 2015
While out in Maryland to talk security with a few government contractors, I realized I was stopped at the intersection of “Snowden River Parkway” and “Broken Land Drive.” The Parkway is named for a Revolutionary War sea captain and not Edward, the thorn in the side of the U.S. government. The coincidence and irony from the intersection of Snowden River Parkway and Broken Land Drive weren’t lost on the handful of security architects and CISOs I talked with later that day in nearby Fort Meade.