Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced tab and looking under the security settings for "Use TLS 1.1" and "Use TLS 1.2". Ensure these are turned on (checked). Doing so will enable your browser to support a higher quality of encryption on this and other websites. You will still be able to browse this site without turning on support for TLS 1.1 and 1.2, but we will have to use a lower level of encryption to accomodate you. See this question on Stack Exchange's Superuser forum from 2011 for more details keeping in mind the comments about TLS 1.2 non-support were made many years ago, and things have changed since then.

If the support for better cryptography has been turned on for your browser, thank you, and you can safely ignore this advisory.

Browser Security Alert


Now that the first real cybersecurity law in US history is on the books, can we expect to see more of the same?

New York’s cybersecurity law for the financial services industry, 23 NYCRR 500, took effect on March 1. The law is making headlines not because it creates a heavy new burden for compliance, but because it takes a broader view of information security than any previous state or federal law. As a highly visible attempt to set priorities and minimum standards, the New York regulations have the potential to influence the long-term direction of cybersecurity legislation in the United States.

We're pleased to announce that once again, PKWARE has earned recognition as one of the world's most influential and innovative cybersecurity companies. The latest edition of the Cybersecurity 500, published by Cybersecurity Ventures, ranks PKWARE among the top information security firms worldwide.

In May 2018, the European Union’s new General Data Protection Regulation will take effect, forcing companies that do business in the EU to comply with strict new standards for data privacy and security. While it won’t have the force of law for another 14 months, the GDPR is already influencing data protection strategies around the globe.

Sometimes, an organization’s biggest information security headaches come not from the ill-intentioned, but from employees who are trying to do the right thing. As companies and government agencies create and exchange unprecedented volumes of sensitive data, uncontrolled or “runaway” encryption is becoming a serious concern for organizations around the world.

In a world of proliferating cyber threats and constant data exchange, encryption continues to gain visibility as the single most important tool for long-term information security. In fact, a recent report from Forrester named data encryption as one of the top global cybersecurity trends for 2017. Now more than ever, individuals and businesses are looking for ways to use encryption to keep their sensitive information safe from data thieves, spies, and other cyber threats.

The DDoS attack that crippled such major sites as Twitter, Paypal, Netflix and Reddit last week shifted the world's attention to the so-called Internet of Things (IoT).

Security experts have discussed the IoT as a target for some time, but the coordinated assault against Dyn, one of several companies hosting the the Domain Name System (DNS), brought the dangers into clearer focus.

To better understand what we're dealing with, a deeper dive into the IoT is necessary. Here's a look at how it works, where the vulnerabilities are, and what can be done to improve the security behind the technology.

Companies responsible for complying with the European Union's General Data Protection Regulation (GDPR) have a lot of uncertainty to process. From Brexit to the demise of Safe Harbor and the unfolding Digital Single Market (DSM), questions abound over how to proceed with compliance efforts.

What follows is a breakdown of these developments and a suggestion for the way forward.

If the Yahoo data breach has taught us anything, it’s that no enterprise is immune to compromise.