Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced tab and looking under the security settings for "Use TLS 1.1" and "Use TLS 1.2". Ensure these are turned on (checked). Doing so will enable your browser to support a higher quality of encryption on this and other websites. You will still be able to browse this site without turning on support for TLS 1.1 and 1.2, but we will have to use a lower level of encryption to accomodate you. See this question on Stack Exchange's Superuser forum from 2011 for more details keeping in mind the comments about TLS 1.2 non-support were made many years ago, and things have changed since then.
If the support for better cryptography has been turned on for your browser, thank you, and you can safely ignore this advisory.
Browser Security Alert
Data protection is a complex challenge, and it demands attention at every level of an organization. PKWARE's in-house experts are here to help you stay up to date on best practices, emerging trends, and new resources for enterprise data security.
In a world of proliferating cyber threats and constant data exchange, encryption continues to gain visibility as the single most important tool for long-term information security. In fact, a report from Forrester named data encryption as one of the top global cybersecurity trends of 2017. Now more than ever, individuals and businesses are looking for ways to use encryption to keep their sensitive information safe from data thieves, spies, and other cyber threats.
The DDoS attack that crippled such major sites as Twitter, Paypal, Netflix and Reddit last week shifted the world's attention to the so-called Internet of Things (IoT).
Security experts have discussed the IoT as a target for some time, but the coordinated assault against Dyn, one of several companies hosting the the Domain Name System (DNS), brought the dangers into clearer focus.
To better understand what we're dealing with, a deeper dive into the IoT is necessary. Here's a look at how it works, where the vulnerabilities are, and what can be done to improve the security behind the technology.
Companies responsible for complying with the European Union's General Data Protection Regulation (GDPR) have a lot of uncertainty to process. From Brexit to the demise of Safe Harbor and the unfolding Digital Single Market (DSM), questions abound over how to proceed with compliance efforts.
What follows is a breakdown of these developments and a suggestion for the way forward.
When PKWARE comes up in conversation, people often make the following comments:
Thing is, this company has been going strong for a long time, providing encryption and compression solutions to more than 30,000 enterprise customers around the world. Our Smartcrypt technology has become a staple for organizations in the financial services, government, healthcare, retail, and manufacturing sectors.
For those unfamiliar with PKWARE’s history and trajectory, the overview below should clear up a few things.
Last week, presumptive Democratic Presidential Nominee Hillary Clinton unveiled a sprawling technology plan that included provisions for encryption and broader cybersecurity.
On paper it looks sensible. But there’s a massive trust problem -- not just for Clinton, but for the Federal Government as a whole.
A big focus of the 2016 European Legal Security Forum (July 12 at 155 Bishopsgate, London) is on the General Data Protection Regulation (GDPR), which will require companies doing business in the European Union to better secure how they collect, store, and use personal information by 2018.
In keeping with the law’s central concepts of “data protection by design” and “data protection by default,” organisations must build stronger data security into their products and services and follow strict guidelines on how personal data may be used. Failure to comply will carry severe penalties of up to 4% of a company’s annual turnover (gross revenue). The law provides specific rules for data processors -- businesses that collect or manage data on behalf of a data controller: