Information Security Leader, Author, Instructor and Speaker

Default utility Image

Cryptography basics for infosecurity managers TAGS: | Let’s face it – cryptography is intimidating. The idea that cryptography is full of complicated mathematical algorithms causes IT managers …Continue reading →

Default utility Image

DES is not sufficient TAGS: It’s common knowledge among those who study cryptography (as well as among most members of the information security community) that …Continue reading →

Default utility Image

Which key is which? TAGS: Users new to the world of cryptography often find themselves confused about the appropriate cryptographic key to use for various …Continue reading →

Default utility Image

Encryption and electronic mail TAGS: | Thanks to diligent education efforts by security administrators, almost every modern computer user is aware that electronic mail, in its …Continue reading →

Default utility Image

Diffie-Hellman key exchange TAGS: If you’ve had any experience choosing a cryptographic algorithm, you’ve probably faced a common dilemma at one time or another: …Continue reading →