Protecting the world's information...
must evolve as new threats, risks and opportunities emerge. To stay in front of the quick-paced security landscape, PKWARE's in-house experts regularly offer blogs covering best practices, fresh resources and the trends behind the headlines. The blogs are meant to spark conversation, so please add your comments, share competing thoughts or pass along topics you'd like us to take on.
Data Protection – Put Your Money Where Your Doubt Is
I have some good news and some bad news on encryption. First, the good news: encryption is all over the place! The bad news? Encryption isn’t really all over the places data needs it to be.
Asking for the Future, Now – Encryption, RSA & the LawThe future is now for encryption. After months of data protection paranoia, the appetite is growing for an evolved, stronger version of encryption to solve today’s big security problems.
The Key that Unlocks Esperanto
As any student or traveler can attest, learning a new language is hard. How about making one up?
Encryption and the Politics of Confusion
A couple of elected officials are finally learning about encryption. In the process, they’ve unleashed resolutions that are sometimes comical and more often chilling.
Protecting Files, Phones & Grandma – A Simple Security Tip Sheet
At first I thought it was a joke for my brother to offer me a ransom to retrieve his phone. As it turned out, everyone in his contact list received the ransom texts and calls – because my brother’s phone had been stolen. In rectifying the stolen phone, local police said they were dealing with a few of these same phone ransoms a week. What stung the most was that my brother could have set up a few security steps at the start to prevent the whole situation.
Building Trust: The Larger Problem Caused by Hacks [Episode 6 Thieves, Snoops & Idiots]
In Episode 6 of “Thieves, Snoops and Idiots”, our hosts Matt Little, VP of Product Development, and Justin Kern, PR and Communications Human, talk about the perilous state of security on software, hardware and open source. We also introduce the TrustTron 6000, a pretend protection device pulled from scrap computer parts.
The Lifestyle of Encryption, Enriched and Famous
What’s next, a White House roundtable on asymmetric key management?
The Quiet Millions
Who Have Not Been Hacked
There are people, businesses and government agencies who have not been hacked.