Data Privacy

Cloud Vector – Cyber Illness, Infection, and Containment

Infectious Humour Humans have long had strong emotions about the sick, infirm, and deformed. The word monster derives from the Latin word for omen, originating from a time when sick and deformed...
Read More
GDPR

Is This Thing on? The Feedback Loop Inherent in GDPR

GDPR’s “right to be forgotten” has generated some concerning results. The limits and pitfalls of retrieving one’s Personally Identifiable Information (PII) is already creating ripples: being able...
Read More
Cybersecurity Industry

More Than A Meal: Cybersecurity Lessons from the Meals on Wheels National Conference

Each year, Meals on Wheels of America hosts senior nutrition and nonprofit professionals from across the country at their annual conference to convene around one thing: how to better support our...
Read More
Data Protection

A Deduction of Errors

Hacking by Design As early as 1994, the concept of security by design was beginning to take shape; anticipating malicious intent and incorporating designs to circumvent or altogether exclude...
Read More
Data Protection

The 4 Ingredients Needed for Securing Data, First

Creating a tight security plan has in the past few years become a concerning aspect of IT for any business, whether established on the scene or just starting up. Traditional security models bring...
Read More
6 min read
GDPR - Aug 13, 2019

GDPROI

So, in light of the growing frequency of massive breaches—at the time of this writing, Capital One’s 100M-record breach was the most recent—you’ve decided to take responsibility for the relationships you hold with customers—to...
Read More
3 min read
Technical Tips - Aug 12, 2019

Key Custodians: Who, What, Where, When, Why, and How

I have worked with a lot of customers and, without a doubt, the most important and frequently neglected facet of managing an appliance I see is key custodianship. Often neglected and forgotten about, the role and accompanying...
Read More
6 min read
Data Privacy - Jul 31, 2019

Self-Worth: the Cost of Identity

The Weighted Scales of Justice In 2012, BlueCross BlueShield (BCBS) of Tennessee paid $1.5M to cover the 2009 breach of 1 million patients’ data—about $1.50 a person. Counting the $17M spent on analysis and recovery, they...
Read More
3 min read
Tokenization - May 16, 2019

A Token for Your Thoughts on Vaultless Tokenization

In our efforts to fulfill our clients’ growing data storage and security demands, we often research new methods to perform our mission and carefully weigh whether or not these discoveries serve our clients’ best interests....
Read More
3 min read
GDPR - May 14, 2019

The Four Most Important Takeaways for Technical Safeguards and Compliance

StrongKey and Smith Anderson Law recently co-hosted a round table discussion on technical safeguards with approximately 20 executives from industries including government, healthcare, software, IT, and AI in attendance. This...
Read More
2 min read
Data Protection - May 7, 2019

TLS: Too Little Security

This article assumes basic knowledge of SSL, TLS, and how those support secure web browsing. For a thorough overview or just a refresher, check out this resource. Around the turn of the century, some big problems with SSL were
Read More
2 min read
Cybersecurity Industry - Apr 2, 2019

The Thales-Gemalto Merger: What Does It Mean?

As a longtime player in enterprise key management infrastructure, we have been advocating for stronger encryption, authentication and key management for years. We have worked to educate the market on securing the core, which...
Read More
2 min read
Data Protection - Feb 5, 2019

The two most important steps to keep your data secure

Although we all recognize that keeping our data safe is important and encryption is something we've probably heard about, how many of us really understand what that means? I know I'm learning more every day. Like the fact that...
Read More
3 min read
Data Protection - Jan 31, 2019

Why Software Remains Insecure—and Why It Really Shouldn't

In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a more insidious picture being...
Read More
1 min read
Data Privacy - Jan 15, 2019

3 Ways to Get a Head Start in the Age of Privacy

There is a lot to think about with the impending Age of Privacy hanging over all of us. As written in Corporate Compliance Insights, there are three key steps to take when considering how to improve your business' privacy...
Read More
4 min read
Breaches - Dec 18, 2018

Marriott—the 500M Record Scandal Marring the Hospitality Industry

I have been a customer of Marriott for over 25 years. With some exceptions, the Marriott chain has been able to hold onto my loyalty with their service better than banks, credit card issuers, airlines and other service...
Read More
7 min read
FIDO - Nov 8, 2018

An In-Depth Guide to FIDO Protocols: U2F, UAF, and WebAuthn (FIDO2)

The FIDO Alliance is a non-profit group that was founded in 2012 with the goal of eliminating passwords from the internet through the use of cryptographic protocols. To learn more about the Alliance, read our FIDO 101 article ...
Read More
12 min read
FIDO - Nov 8, 2018

FIDO 101: Understanding FIDO Strong Authentication and What It Can Do for You

What is FIDO? FIDO is an acronym for “Fast Identity Online.” The FIDO Alliance (www.fidoalliance.org) is a non-profit group that was founded in 2012 with the goal of eliminating passwords from the internet through the use of...
Read More
3 min read
GDPR - Sep 11, 2018

GDPR and CCPA: Data privacy is ready for its close-up, and we couldn’t be happier

Since May, the “GDPR effect” has been most visible through a myriad of emails from your vendors or favorite companies assaulting your inbox, assuring you of how much they care about your privacy. A few asked for you to provide
Read More
3 min read
E-Commerce - Nov 5, 2017

Mitigating e-Commerce Fraud

Today, we bring you this guest post from our founding CTO, Arshad Noor on solution requirements for preventing e-Commerce Fraud. You can read more posts like this at https://alesa.website/ and we hope you’ll join us on our...
Read More