The assumption that software security can stay ahead of the hackers is not true because the software security industry is always reacting to threats that hackers expose. Once hackers start exploiting a flaw in an application, securi…
Federal governments and major technology firms are arguing for or against encryption, respectively. But why?
Due to recent political turmoil and devastating events overseas, the topic of end-to-end encryption has reentered public discuss…
Data Masking/Tokenization/Anonymization replaces sensitive information with fictitious data while retaining the original data format. The data masking process lets you continue to work with your data as if it were not encrypted. Dat…
Jurisdictions around the world, including the European Union and Canada, are enacting laws and creating regulations forcing companies that collect personally identifiable information (PII) to store the data of their residents within their n…Read More Court Rulings Limit Privacy Protections From Data Residency
Email is one of the most critical business tools and a major component of the lives of many people. At the same time, it seems to lack adequate security as the Clinton campaign email leaks and the publication of France’s Macron emails have …Read More If everybody could read your email, are you secure?
A lack situational awareness is hurting the ability of companies and the public sector to adequately protect sensitive information. Intellectual property, sensitive business data, personally identifiable information and infrastructure acces…Read More Can Two-Factor Authentication Keep Your Company’s Data Safe?
Common Criteria certificate ensure that there is no gap in data protection according to the solution’s security profile.
According to the National Cyber Security Alliance, 556 million personal records are stolen every y…Read More Security certifications (Part 2): Total product certification
f you don’t have anything to hide, then why would you object if the police come to your home to search and take pictures of your documents without your permission?
Unfortunately for you as a consumer, the discussion regardi…Read More I have “nothing to hide”! Why should I care about Government surveillance?
Countries are establishing data residency regulation to protect private and classified data generated from their citizen by mandating storing this information within that country (the country of origin). The theory is that the laws of the c…Read More Does Data Residency Reduce Cloud Risks?
The government want the ability to conduct surveillance on encrypted communications.
No matter how much law firms invest in data loss prevention and information protection, the government wants to be able to access private, …Read More Government backdoor: The basics of the plan to bypass encryption
This article is the third in a series that discusses data breach threats and possible solutions. The first two articles, “What You Need to Know,” and “Threats and Consequences,” make it clear that businesses need to take action to reduce da…Read More Data Breaches: The Encryption Challenges