June 8, 2015 Mea Culpa? Locker Ransomware Author Apologizes, Decrypts Files for Free 2 min read - Locker Ransomware author apologizes and decrypts files for free, but is there more to this story than just a compassionate criminal showing remorse?
May 21, 2015 Logjam Flaw May Open Data to Cybercriminals by Fooling Web Browsers 2 min read - Researchers say the Logjam flaw could fool Web browsers and servers into using weak encryption keys, allowing cybercriminals to intercept and decode data.
Application Security May 19, 2015 How to Enhance Your Cryptographic Key Protection 6 min read - Understanding how keys are hacked and the practices used to access this critical information can ultimately improve cryptographic key protection.
Application Security May 1, 2015 How to Dramatically Improve Your Database Encryption 4 min read - Database encryption can be drastically improved through the use of hardware security modules (HSMs), which provide offline encryption services.
Cloud Security September 9, 2014 Cloud Key Management: Coming to a Cloud Near You 3 min read - Cloud offerings are becoming a mainstay in Internet resources, but how do we control our cloud data? What is your cloud key management strategy?