According to a recent paper, threat actors are abusing the code signing process associated with public key infrastructure and evading antivirus detection.
Cloud offerings are becoming a mainstay in Internet resources, but how do we control our cloud data? What is your cloud key management strategy?
As industry is assessing the use of the cloud to store and manage data, the question that is always asked is: is my data secure in the cloud? If we look at the problem from the perspective of a 19th century linguist and cryptographer, the answer is...
On December 27, 2013, Forbes reported that encrypted PIN data had been stolen in a data breach. There are some important lessons about the Target Hack of Encrypted PIN Data that are worth highlighting.