Date Published: April, 01, 2015
SAN FRANCISCO — The Internet of Things, along with everything else, is insecure. The U.S. government wants to help with that and other security problems — if you still trust them. Those were two of several messages from the annual RSA Conference here… READ MOREDate Published: April, 01, 2015
Michela Menting, Practice Director The RSA Conference 2015 was a busy one for me this year and I met up with about 30 different companies during the week. The big topics this year that I wanted to highlight flowed around automation, threat intelligence … READ MOREDate Published: January, 01, 2015
Mr. President, the status quo in cybersecurity is failing this country. It is failing our commercial sector, which is being publicly breached on a weekly basis, and it is failing our government sector as well. It is time to take bold and decisive action t… READ MOREDate Published: December, 01, 2014
Author: Chris Stobing On one muggy morning in June of 2013, a journalist for the news organization The Guardian rolled out of her bed, and opened her laptop. On it was an email from an address she didn’t recognize, with a message from a man she’d nev… READ MOREDate Published: December, 01, 2014
Author: Karen Scarfone Full disk encryption (FDE) is widely used on a variety of desktop and mobile device operating systems. This technology helps secure important information and prevents breaches by encrypting all of the data on a hard drive at rest. … READ MOREDate Published: June, 01, 2014
Author: Nate Rushfinn The CSD 3324 telephone and fax system has provided the Department of Defense (DoD) with secure voice and fax communications for years. Using the AES 256-bit encryption algorithm and the Diffie-Hellman key exchange, this old work hor… READ MOREDate Published: June, 01, 2014
Author: James Poole In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security chal… READ MOREDate Published: April, 01, 2014
Author: Warwick Ashford The Trusted Computing Group (TCG) has announced the availability of the Trusted Platform Module (TPM) 2.0 library specification. TPMs are designed to provide a secure root of trust to protect data in computers and mobile devices … READ MOREDate Published: April, 01, 2014
Author: Paul F. Roberts Apple is the world's most valuable company - and one of its wealthiest. The Cupertino, Calif. firm reported a quarterly net profit of $13.1 billion on record revenue of $57.6 billion in its most recent fiscal quarter and is engage… READ MOREDate Published: February, 01, 2014
Author: Jon Oltsik The industry should be talking about the security skills shortage, open security standards, and automation but these subjects will get minimal lip service. In my blog yesterday, I outlined the hot topics I anticipate at this year's RSA… READ MORE