Application Security May 19, 2015 How to Enhance Your Cryptographic Key Protection 6 min read - Understanding how keys are hacked and the practices used to access this critical information can ultimately improve cryptographic key protection.
May 14, 2015 Knock, Knock: New Ransomware Breaks In for Bitcoins 2 min read - Two new ransomware threats have surfaced in the last week, one identified by Symantec and the other by Rackspace. How can companies protect their data?
Advanced Threats May 8, 2015 Ransomware Triggers Cryptographers’ Call for Action 2 min read - Ransomware is one of the biggest cyberthreats organizations face today. In response, cryptographers are calling for reform to encryption practices.
Application Security May 1, 2015 How to Dramatically Improve Your Database Encryption 4 min read - Database encryption can be drastically improved through the use of hardware security modules (HSMs), which provide offline encryption services.
Government April 29, 2015 Feds Move Toward HTTPS Website Encryption 2 min read - A new policy announced by the White House in March requires federal websites to support traffic encryption within two years through HTTPS.
Application Security April 28, 2015 Software Defenses to OWASP’s Top 10 Most Common Application Attacks 6 min read - Software developers must learn how to build security in from the ground up to defend against the most common application attacks, as determined by OWASP.
Data Protection April 24, 2015 Top Tips for Surviving a Data Encryption Project 3 min read - Encrypting your data is an important step for keeping it secure. Follow these tips to keep your data encryption project running smoothly.
April 13, 2015 Filing Taxes Online? Take a Pass on Public Wi-Fi 2 min read - Americans filing taxes online should avoid doing so over public Wi-Fi networks so they aren't the next victims of cybercriminal activity.
CISO January 5, 2015 Your Encryption Keys, Your Kingdom 3 min read - Do you know who has access to the keys that encrypt your data? How to keep and control access of your keys when using a third-party source.
Banking & Finance December 17, 2014 Blockchain.info, The Second Official Website to Receive a Tor Address 3 min read - Blockchain.info has increased its privacy and security measures for all its users by becoming the second website in the world to receive a Tor address.