Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced tab and looking under the security settings for "Use TLS 1.1" and "Use TLS 1.2". Ensure these are turned on (checked). Doing so will enable your browser to support a higher quality of encryption on this and other websites. You will still be able to browse this site without turning on support for TLS 1.1 and 1.2, but we will have to use a lower level of encryption to accomodate you. See this question on Stack Exchange's Superuser forum from 2011 for more details keeping in mind the comments about TLS 1.2 non-support were made many years ago, and things have changed since then.

If the support for better cryptography has been turned on for your browser, thank you, and you can safely ignore this advisory.

Browser Security Alert

Protecting the world's information must evolve as new threats, risks and opportunities emerge. To stay in front of the quick-paced security landscape, PKWARE's in-house experts regularly offer blogs covering best practices, fresh resources and the trends behind the headlines. The blogs are meant to spark conversation, so please add your comments, share competing thoughts or pass along topics you'd like us take on.

Data Security Trends Part 2: De-Perimeterization, The Walls Come Tumbling Down

Data that is stored is usually thought of as data-at-rest. It is typically protected by the operating system access controls designed to permit access to only those intended and approved to access the data. Diana Kelley, of SecurityCurve, explains that the myth of the “trusted insider” assumed that internal users could always be trusted.

According to Kelley, while this model was a bit dubious even in the 90s, it is clearly no longer viable in the current reality of de-perimeterization. De-perimeterization refers to the fact that single gateway perimeters do not adequately protect data that is shared and transmitted by an organization in today’s IT architecture.

Data in motion is data that is moving across the network. Such data is typically very vulnerable before it leaves and is vulnerable when it arrives. Destination systems are different operating system with different access controls and do not have the same protection for the data as the originating system.

Kelley states that placing security into applications emerged as an interim model when the perimeters began breaking down, but it does not adequately address the total data security problem. She concludes that there is no simple “inside” and “outside” – there are, in fact, many complex zones.

Recent research published by IDC claims that only two-thirds of EMEA manufacturers are confident that their data is protected from external and internal attacks. And, of the security threats faced by manufacturers, the greatest is employee error or accidental loss of sensitive information.


This blog entry is the second in a five part series about data security trends of the past decade. Stay tuned for "Part 3: Security Approaches, A Major Shift in Trends".

Related Posts

Go To Top