External hackers and insider threats. Customer expectations and government mandates.
Data protection is a complex challenge, and it demands attention at every level of an organization. PKWARE's in-house experts are here to help you stay up to date on best practices, emerging trends, and new resources for enterprise data security.
At first I thought it was a joke for my brother to offer me a ransom to retrieve his phone. As it turned out, everyone in his contact list received the ransom texts and calls – because my brother’s phone had been stolen. In rectifying the stolen phone, local police said they were dealing with a few of these same phone ransoms a week. What stung the most was that my brother could have set up a few security steps at the start to prevent the whole situation.
In Episode 6 of “Thieves, Snoops and Idiots”, our hosts Matt Little, VP of Product Development, and Justin Kern, PR and Communications Human, talk about the perilous state of security on software, hardware and open source. We also introduce the TrustTron 6000, a pretend protection device pulled from scrap computer parts.
The world of data protection is under attack from three main threats: thieves, snoops and idiots. Well, that's how we categorize internally the risks facing business information security. Starting this week, we've started to broadcast what we mean by thieves, snoops and idiots – and what both business leaders and security developers can do about them.
While out in Maryland to talk security with a few government contractors, I realized I was stopped at the intersection of “Snowden River Parkway” and “Broken Land Drive.” The Parkway is named for a Revolutionary War sea captain and not Edward, the thorn in the side of the U.S. government. The coincidence and irony from the intersection of Snowden River Parkway and Broken Land Drive weren’t lost on the handful of security architects and CISOs I talked with later that day in nearby Fort Meade.