Information Security Leader, Author, Instructor and Speaker

Default utility Image

Encryption 101: Keys, Algorithms and You TAGS: In today’s world, understanding at a minimum basic level how to protect data you’re both storing and transmitting is essential …Continue reading →

Default utility Image

Encryption Demystified TAGS: | Just hearing the word “encryption” can bring shudders to technology professionals, many of whom find themselves intimidated by this seemingly …Continue reading →

Default utility Image

Laptop full disk encryption: debunking the myths TAGS: | | Full disk encryption (FDE) is widely used to control the risk of users travelling with (and losing) portable computers containing …Continue reading →

Default utility Image

Three portable data storage encryption methods TAGS: | Over the past few months, we’ve been exploring different ways to apply encryption to secure confidential business data in a …Continue reading →

Default utility Image

Data encryption methods: securing emerging endpoints TAGS: | These policies made it easy to feel secure about having your sensitive data left in vehicles, travelling through airports and …Continue reading →

Default utility Image

Encrypting and securing websites with HTTPS TAGS: | | You might know that it’s possible to secure a website with encryption technology, but do you know what that “S” …Continue reading →

Default utility Image

Encrypting email in Microsoft Outlook TAGS: | Cryptography is an essential element of every security professional’s toolkit. We recently covered the basics of cryptography and now turn …Continue reading →

Default utility Image

Encryption basics: How asymmetric and symmetric encryption works TAGS: Encryption technologies form the cornerstone of many information security technologies. Unfortunately, many security practitioners don’t understand encryption well due to …Continue reading →

Default utility Image

Podcast: Endpoint encryption strategies TAGS: | When a laptop turns up stolen, it’s reassuring to know that the contents of the device were encrypted, transforming a …Continue reading →

Default utility Image

Cracks in WPA? How to continue protecting Wi-Fi networks TAGS: | Frequent readers of my tips know I haven’t been afraid to pull out my soapbox and rant about the inherent …Continue reading →