Lessons For IT Professionals From Prominent Security Breaches

Ask a security professional what the acronym "CIA" in data security expands to. If you get the response "confidentiality, integrity, availability," then you'll get an indicator of why the state of cyb...
Read more

Voice of the Future

HELLO, COMPUTER? The landscape around payments processing is a convoluted, pockmarked patchwork with hazy bogs of uncertainty parked right beside towering bastions of safety and confidence. Increasing...
Read more

FIDO 201: Moving beyond PKI and PIV Card Authentication with PKI2FIDO

If you're new to the world of the FIDO Alliance, we recommend reading our FIDO 101 article, and our in-depth guide to FIDO Protocols.
Read more

It’s Time to Join Big Tech with FIDO2-based Strong Authentication

We live in perilous times, both with regards to our personal health and our online security. Similar to physical viruses like the COVID-19-causing coronavirus, computer viruses spread in a variety of ...
Read more

Risky Business: The Importance of Risk Assessments

Creating a secure home for sensitive data is fast becoming a business requirement, but it is often new ground to cover for many companies. Businesses have varying measures in place ranging from nothin...
Read more

The Spoils of Ransomware: Turns out, Blockchain Is for Hackers

Ransomware, one of the most flourishing and lucrative attack forms, generally demands payment in BitCoin due to its inherent anonymity and reliability—both found in the blockchain ledger. Since it see...
Read more

GDPROI

So, in light of the growing frequency of massive breaches—at the time of this writing, Capital One’s 100M-record breach was the most recent—you’ve decided to take responsibility for the relationships ...
Read more

Key Custodians: Who, What, Where, When, Why, and How

I have worked with a lot of customers and, without a doubt, the most important and frequently neglected facet of managing an appliance I see is key custodianship. Often neglected and forgotten about, ...
Read more

Self-Worth: the Cost of Identity

The Weighted Scales of Justice In 2012, BlueCross BlueShield (BCBS) of Tennessee paid $1.5M to cover the 2009 breach of 1 million patients’ data—about $1.50 a person. Counting the $17M spent on analys...
Read more

Why Software Remains Insecure—and Why It Really Shouldn't

In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a more in...
Read more