Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced tab and looking under the security settings for "Use TLS 1.1" and "Use TLS 1.2". Ensure these are turned on (checked). Doing so will enable your browser to support a higher quality of encryption on this and other websites. You will still be able to browse this site without turning on support for TLS 1.1 and 1.2, but we will have to use a lower level of encryption to accomodate you. See this question on Stack Exchange's Superuser forum from 2011 for more details keeping in mind the comments about TLS 1.2 non-support were made many years ago, and things have changed since then.

If the support for better cryptography has been turned on for your browser, thank you, and you can safely ignore this advisory.

Browser Security Alert

Search Results

Assuming bill is required, and brenner is required, and with Blog as Category , the following results were found.

  • Key Management: Your Tales From The Trenches

    Now that I’m settled in here at PKWARE, I’m going to do something I haven’t done since my journalist days: I’m going to interview people on a regular basis and work the feedback into a steady stream of analytical posts. I’ll ask questions of my...
  • GDPR Will Dominate 2016 European Legal Security Forum

    A big focus of the 2016 European Legal Security Forum (July 12 at 155 Bishopsgate, London) is on the General Data Protection Regulation (GDPR), which will require companies doing business in the European Union to better secure how they collect, store,...
  • Understanding Security And The Internet of Things

    The DDoS attack that crippled such major sites as Twitter, Paypal, Netflix and Reddit last week shifted the world's attention to the so-called Internet of Things (IoT). Security experts have discussed the IoT as a target for some time, but the...
  • EU Data Security: Three Elements of Uncertainty

    Companies responsible for complying with the European Union's General Data Protection Regulation (GDPR) have a lot of uncertainty to process. From Brexit to the demise of Safe Harbor and the unfolding Digital Single Market (DSM), questions abound over...
  • The Yahoo Breach: Four Lessons

    If the Yahoo data breach has taught us anything, it’s that no enterprise is immune to compromise.
  • Clinton, Encryption And The Trust Problem

    Last week, presumptive Democratic Presidential Nominee Hillary Clinton unveiled a sprawling technology plan that included provisions for encryption and broader cybersecurity. On paper it looks sensible. But there’s a massive trust problem -- not just...
  • What Does Brexit Mean For Data Security Laws?

    The UK’s vote to break away from the European Union raises many questions about the future of the myriad data security laws affecting the entire continent.
  • How PKWARE Became A Data Encryption Company

    When PKWARE comes up in conversation, people often make the following comments: I didn’t know PKWARE was still around! Encryption? I thought PKWARE was about .ZIP file technology? Thing is, this company has been going strong for a long time, providing...
  • The DNC Hack: From Prediction To Reality

    Among the 2016 cybersecurity predictions he made back in January, PKWARE CEO and President V. Miller Newton said a presidential campaign would be hacked before the November election. That prediction has become reality, according to The Washington Post.
  • With Data Security, Compliance Is The Beginning, Not The End

    Ask PKWARE customers about the biggest challenge they face, and many respond with one word: compliance. Every industry has separate mandates to worry about, such as HIPAA for healthcare, and PCI DSS for financial services. The common denominator in...
  • When The Security Expert Is The Idiot

    Here at PKWARE, when we describe the types of adversaries our technology is designed to block, we say “thieves, snoops and idiots.” The first two are easy to describe. The thief wants to break into enterprise networks and steal sensitive information...

Results 1 - 11 of 11