Information Security Leader, Author, Instructor and Speaker

Default utility Image

Weighing double key encryption challenges, payoffs TAGS: | Encryption is one of the cornerstones of cybersecurity. Organizations rely on this technology to protect data while it is in …Continue reading →

Default utility Image

The difference between AES and DES encryption TAGS: | | | Data Encryption Standard and Advanced Encryption Standard sound similar, and both are examples of symmetric block ciphers. That is where …Continue reading →

Default utility Image

Encryption: Six Principles That CIOs Need to Know TAGS: “Encryption is an intimidating technology for many IT leaders because it is highly technical and relies upon complex mathematical algorithms. …Continue reading →

Default utility Image

What’s Next for Encryption Legislation? TAGS: | The legal battle between the FBI and Microsoft this spring brought encryption into the public spotlight in a major way …Continue reading →

Default utility Image

Encryption is Not Evil TAGS: | In the past few months, deadly terrorist attacks rocked both Paris, France and San Bernardino, California.  The technical investigation following …Continue reading →

Default utility Image

5 Security Must-Knows for Windows 10 TAGS: | | | Microsoft’s September release of the Windows 10 operating system caused a flurry of media activity centered around security and privacy …Continue reading →

Default utility Image

Get Ready for PCI DSS 3.1! TAGS: | | | Get ready, everyone – the next version of PCI DSS is on the books! If it seems like you’re hearing …Continue reading →

Default utility Image

Ransomware: Your Data Held Hostage TAGS: | | “Your personal files are encrypted!” glares the headline on a red pop-up window. The text that follows warns the user that …Continue reading →

Default utility Image

Hacking the Cloud TAGS: | | | Nude photos of well-known actresses certainly garner attention on their own, but this summer they drew attention to an unlikely …Continue reading →

Default utility Image

Exploring Encryption TAGS: | Encryption is one of the most powerful tools available to security professionals seeking to protect sensitive information from unauthorized disclosure. …Continue reading →