Encryption Requirements Driven by Data State
Have you ever had that feeling that something is amiss? While conducting research on when data encryption is required, I noticed something that seemed a little off. It is commonplace for regulations to require measures be taken to protect data. Many regulations recommend encryption to protect data as it exists ... Read More
A Natural Law for Digital Data
Digital data provides the strength and vitality of the Information Age. Bits have as much, if not more, value than comparable assets in the physical world. Losing control of proprietary or critical information could have legal, financial or business ramifications. Digital data completely changes the nature of information. It is ... Read More
Cybercriminals Increasingly Exploiting Pandemic Trauma
The ancient military strategist Sun-Tzu wrote that “in the midst of chaos, there is also opportunity.” He was referring to the ability to point your opponent toward the direction of your choosing. Cybercriminals have taken this philosophy to heart: They use the personal and organizational disorder brought on by the ... Read More
BootHole Shows Need for Greater Scrutiny
The recent BootHole and related vulnerabilities raise the question of whether software used for critical security functions should have special scrutiny. When a security operation fails the ramifications are considerable, especially when the security process is widely distributed. Heartbleed, a critical vulnerability found in the OpenSSL library, is an example ... Read More

