In a digital world, everything is a 1 or a 0. Those 1’s and 0’s can range from the lifeblood of an organization down to a simple message from one person to another. In most cases, those 1’s and 0’s can be jostled around: enter encryption. Tight encryption standards can make even the most significant, sensitive data appear to be indecipherable to the naked eye. Multiple firewalls, strong antivirus software, enterprise-wide encryption… these are all techniques utilized to strengthen our security posture to prevent bad actors from accessing sensitive data. Bolstering a strong perimeter security defense, coupled with constantly rotating encryption keys inside and outside of the perimeter, and always having the latest antivirus definitions will lead to a stronger aggregate security posture.
Read moreThank you to Cyphre for contributing this guest post to our blog as we focus on GDPR compliance!
Now that European Union’s General Data Protection Regulation (GDPR) is set to become law, companies must establish policies and technology controls to securely store and transfer personal data of any person residing in the EU. Data that can be used to identify a person, such as physical address, IP address, and more, as well as genetic data, information about religious and political views, sexual orientation, and more must be encrypted or made anonymous. Individuals have the right to erase their personal data by withdrawing consent or when it is no longer being used for its original purpose.
Read moreBack in June, Kevin Mooney wrote an excellent piece on The Strong Case for Interoperability. Getting back to that subject matter, in perhaps not the most ideal of circumstances, we are going to talk about standards, interoperability, and transition as it pertains to resolving systemic issues. This is being driven by faults in 802.11 as described in Mathy Vanhoef’s and Frank Piessens’ paper on key reinstallation attacks released today.
Read moreAdobe's Product Security Incident Response Team (PSIRT) accidentally posted their private key to the internet allowing anyone with access to either side of a conversation with the PSIRT to be able to decrypt the messages. The Adobe security team was quick to revoke the PGP key, but it has left people with encrypted messages to Adobe in the clear. How did it happen?
Read moreEquifax made news recently for being the victim of a hack; their systems were compromised and data was accessed by person(s) that weren’t authorized to have it. Unfortunately, this is not an uncommon occurrence these days. Hacks happen all the time, to companies both large and small. Individual hacks aren’t really noteworthy any more. But what is particularly noteworthy about this incident is the data that was accessed: the personal (and supposed-to-be private) information of roughly half of the US population.
Read moreThe Telephonic Treatment
Like most people who own one, I love my smartphone. I love that I can use Activator to keep my phone from automatically playing music, even over Bluetooth. I love that I can select text and move the cursor without leaving the keyboard. I love having five icons on the dock, speeding up the OS’s animations, and running a terminal session on my phone.
What I don’t love is running an old version of the OS so I don’t lose my jailbreak, and thus, all the above features.
Read morePatented solution covers systems and methods for encryption key management, federation, and distribution via an interconnected, orchestrated security ecosystem.
Read moreToday, HBO announced publicly that they have experienced a “cyber incident which resulted in the compromise of proprietary information.” Like many other companies, HBO also stated that “data protection is a top priority” and yet we have seen a common theme that has become more prevalent in recent years. Large companies have trouble protecting their data.
Read moreA Republican National Committee data analytics firm, Deep Root Analytics, disclosed that as many as 198 million U.S. citizens’ names, dates of birth, home addresses, phone numbers, and other identifiable information were exposed to the internet due to a database misconfiguration. Many firms are hastily moving to the cloud without fully understanding the security implications of doing so. By rolling new cloud implementations, data collection and analysis problems become simpler tasks. However, without a proper security framework around it, data is accessible to the internet and more likely to be retrieved.
Read more