There are bad ideas and then there are really, really bad ideas.
The Industry’s Only SaaS-Delivered Enterprise DLP
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
No-Compromise Data Protection is:
- Cross Platform
- Flexible Controls
If you haven’t been following the news this week, you missed a major story. Wikileaks has revealed that CIA actively engages in espionage. And it uses computers to do so. But for most end users and encryption advocates, this news is good.
The Internet’s security infrastructure is incredibly fragile, and every once in a while a small fragment of it comes loose and breaks all over the floor. Depending upon the importance of the piece, the mess can sometimes be swept up quickly before anyone notices. That is most decidedly not the case with the recent demonstration of a practical collision in SHA-1.
For people who are interested in personal privacy and protecting their online lives, these are troubling times.
The robots are coming for our jobs, little by little, and now our appliances are coming for our private data, too.
Information security is a hot industry with lots of new challenges right now - but have we forgotten to take care of the basics?
Advances in consumer technology have made digital surveillance easier than ever for governments and criminals alike. But fear not - as surveillance capabilities have expanded so have the range of encryption systems available to users.
Criminals, like most humans, are fundamentally lazy. When presented with several options for accomplishing a task, they generally will take the easiest one. For some people that’s a function of their skill set, but for others it’s simple practicality. Easier is better. And for criminals, easier also means more money.
The decision by the U.S. Department of Homeland Security to designate election infrastructure as critical infrastructure significantly extends federal protection of voting systems.
Technology in general and information security specifically have changed so dramatically in the past 10 years that it’s difficult to even remember how things were a decade ago. Nearly everything has shifted and evolved, but one of the few things that’s remained the same is the minefield of attribution.