Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced tab and looking under the security settings for "Use TLS 1.1" and "Use TLS 1.2". Ensure these are turned on (checked). Doing so will enable your browser to support a higher quality of encryption on this and other websites. You will still be able to browse this site without turning on support for TLS 1.1 and 1.2, but we will have to use a lower level of encryption to accomodate you. See this question on Stack Exchange's Superuser forum from 2011 for more details keeping in mind the comments about TLS 1.2 non-support were made many years ago, and things have changed since then.

If the support for better cryptography has been turned on for your browser, thank you, and you can safely ignore this advisory.

Browser Security Alert

Blog


Ask PKWARE customers about the biggest challenge they face, and many respond with one word: compliance.

Every industry has separate mandates to worry about, such as HIPAA for healthcare, and PCI DSS for financial services. The common denominator in just about every compliance mandate is the need for Data Loss Prevention.

Overall, compliance requirements have been good for security. If it weren’t for these regulations and industry standards, many enterprises wouldn’t be doing nearly enough to safeguard sensitive data.

But there are risks in how enterprises handle compliance. A checkbox mentality often ensues, where companies put their primary focus on checking off the boxes on a list during a compliance audit.

Read more ...

Here at PKWARE, when we describe the types of adversaries our technology is designed to block, we say “thieves, snoops and idiots.”

The first two are easy to describe. The thief wants to break into enterprise networks and steal sensitive information and the snoop is either out to invade your privacy or is a trusted employee with access to information that, if shared with the outside world, could cause a lot of damage to the enterprise’s reputation.

Read more ...

I recently presented at the Healthcare Information and Management Systems Society – North Carolina Chapter – where I talked about the importance of securing data within the healthcare industry. During my time at the conference, I kept my ear to the ground to better understand broader trends impacting the industry and left with three big takeaways:

Read more ...

Like many of us in the cybersecurity industry, I paid close attention to the recent fight between the FBI and Apple over an encrypted phone.

Read more ...

The worlds of fantasy and security have collided twice recently, once in practice and the other in principle.

Read more ...

Protecting the world’s information can create strange bedfellows. But sometimes it’s worth the unexpected allegiances with potential rivals or social media companies in an effort for everyone to get a better grasp on data security.

Read more ...

Looking at the volume of recent data breaches, it appears that malicious hackers are becoming increasingly savvy. Maybe. But the more likely cause is that miscreants are walking through doors left open by a legacy of bad security practices – or they are working with people already inside with access to sensitive data.

Read more ...

The nerds have shot back. For those of us who remember the “crypto wars” during the Clinton Administration, it was the technical takedown of bad encryption plans for the Clipper chip by security leaders which acted as data security discussion’s denouement. When cracking open encryption was proven at the technical level to be bad practice for everyone – government, law, business, private citizens – it was time for the snooping and surveillance advocates to take their ball and go home. Ever since, we’ve enjoyed the ability to implement encryption for better privacy and stronger business security. You can even draw a link from stronger crypto to the great tech companies that popped up and thrived before and after the Dot Com Bubble.

Read more ...