A Deduction of Errors

Hacking by Design As early as 1994, the concept of security by design was beginning to take shape; anticipating malicious intent and incorporating designs to circumvent or altogether exclude scenarios...
Read more

The 4 Ingredients Needed for Securing Data, First

Creating a tight security plan has in the past few years become a concerning aspect of IT for any business, whether established on the scene or just starting up. Traditional security models bring up i...
Read more

GDPROI

So, in light of the growing frequency of massive breaches—at the time of this writing, Capital One’s 100M-record breach was the most recent—you’ve decided to take responsibility for the relationships ...
Read more

Key Custodians: Who, What, Where, When, Why, and How

I have worked with a lot of customers and, without a doubt, the most important and frequently neglected facet of managing an appliance I see is key custodianship. Often neglected and forgotten about, ...
Read more

Self-Worth: the Cost of Identity

The Weighted Scales of Justice In 2012, BlueCross BlueShield (BCBS) of Tennessee paid $1.5M to cover the 2009 breach of 1 million patients’ data—about $1.50 a person. Counting the $17M spent on analys...
Read more

Biometrics Brings Us One Step Closer to Eliminating Passwords for Good

There are two primary means of authentication in use today: basic and multifactor. With basic authentication, the user ID and password are the most common. Recently, however, you have likely seen the ...
Read more

The 4 Most Important Takeaways for Technical Safeguards and Compliance

StrongKey and Smith Anderson Law recently co-hosted a round table discussion on technical safeguards with approximately 20 executives from industries including government, healthcare, software, IT, an...
Read more

TLS: Too Little Security

This article assumes basic knowledge of SSL, TLS, and how those support secure web browsing. For a thorough overview or just a refresher, check out this resource. Around the turn of the century, some ...
Read more

The Thales-Gemalto Merger: What Does It Mean?

As a longtime player in enterprise key management infrastructure, we have been advocating for stronger encryption, authentication and key management for years. We have worked to educate the market on ...
Read more

Duty of Care and Information Security

The Hippocratic oath and the principles embodied in “duty of care” guide the daily actions of healthcare providers. But when it comes to information security and protecting sensitive PHI, is the healt...
Read more