What’s next, a White House roundtable on asymmetric key management?

Read more ...

There are people, businesses and government agencies who have not been hacked.

Read more ...

The world of data protection is under attack from three main threats: thieves, snoops and idiots. Well, that's how we categorize internally the risks facing business information security. Starting this week, we've started to broadcast what we mean by thieves, snoops and idiots – and what both business leaders and security developers can do about them.

Read more ...

While out in Maryland to talk security with a few government contractors, I realized I was stopped at the intersection of “Snowden River Parkway” and “Broken Land Drive.” The Parkway is named for a Revolutionary War sea captain and not Edward, the thorn in the side of the U.S. government. The coincidence and irony from the intersection of Snowden River Parkway and Broken Land Drive weren’t lost on the handful of security architects and CISOs I talked with later that day in nearby Fort Meade.

Read more ...

Data security is a grim business, especially of late. There’s an expected seriousness when you’re handling sensitive data, stacks of information and the cold action of computing. But isn’t it time we cracked a smile?

Read more ...