Cybersecurity Industry

More Than A Meal: Cybersecurity Lessons from the Meals on Wheels National Conference

Each year, Meals on Wheels of America hosts senior nutrition and nonprofit professionals from across the country at their annual conference to convene around one thing: how to better support our...
Read More
Data Protection

A Deduction of Errors

Hacking by Design As early as 1994, the concept of security by design was beginning to take shape; anticipating malicious intent and incorporating designs to circumvent or altogether exclude...
Read More
Data Protection

The 4 Ingredients Needed for Securing Data, First

Creating a tight security plan has in the past few years become a concerning aspect of IT for any business, whether established on the scene or just starting up. Traditional security models bring...
Read More
GDPR

GDPROI

So, in light of the growing frequency of massive breaches—at the time of this writing, Capital One’s 100M-record breach was the most recent—you’ve decided to take responsibility for the...
Read More
Technical Tips

Key Custodians: Who, What, Where, When, Why, and How

I have worked with a lot of customers and, without a doubt, the most important and frequently neglected facet of managing an appliance I see is key custodianship. Often neglected and forgotten...
Read More
6 min read
Data Privacy - Jul 31, 2019

Self-Worth: the Cost of Identity

The Weighted Scales of Justice In 2012, BlueCross BlueShield (BCBS) of Tennessee paid $1.5M to cover the 2009 breach of 1 million patients’ data—about $1.50 a person. Counting the $17M spent on analysis and recovery, they...
Read More
3 min read
Tokenization - May 16, 2019

A Token for Your Thoughts on Vaultless Tokenization

In our efforts to fulfill our clients’ growing data storage and security demands, we often research new methods to perform our mission and carefully weigh whether or not these discoveries serve our clients’ best interests....
Read More
3 min read
GDPR - May 14, 2019

The Four Most Important Takeaways for Technical Safeguards and Compliance

StrongKey and Smith Anderson Law recently co-hosted a round table discussion on technical safeguards with approximately 20 executives from industries including government, healthcare, software, IT, and AI in attendance. This...
Read More
2 min read
Data Protection - May 7, 2019

TLS: Too Little Security

This article assumes basic knowledge of SSL, TLS, and how those support secure web browsing. For a thorough overview or just a refresher, check out this resource. Around the turn of the century, some big problems with SSL were
Read More