Confidentiality
Encryption – CISSP Domain 3
We’re circling back to some more CISSP-related materials. Today’s topic will be encryption, which can be found in CISSP Domain 3. By its very nature, encryption is meant to hide the meaning ...
Nearly Thirty Percent Of Most Popular VPNs Worldwide Owned By Hidden Chinese Organizations
Image via VPNPro Jan Youngren, writing at VPNPro has developed ownership intelligence (PDF) pointing to ninety-seven VPN properties that are owned by twenty-three organizations based in Communist China. H/T, further Via. Read ...
Making Sense of Security, Privacy and Confidentiality in Texting
Today, pretty much everyone is texting. It’s made life so much easier – send a message on your own time and preferred device, usually without having to stop what you’re doing, and ...
Data is the New Currency – Own Your Data or Someone Else Will
National Data Privacy Day reminds us how important it is to be empowered to take ownership to protect our privacy, control our digital footprints and advocate for the protection of privacy and ...
Controlling the Narrative: The Role of the Board of Directors
In an era where data breaches or leaks seem inevitable, business disruptions too frequent and the press all too prone to run away with a salacious story, what can the board of ...
Secure Payments of the Future
Protecting the safety and integrity of the U.S. payment system is a top priority and the responsibility of all stakeholders in the payments industry. Learn more about how the Secure Payments Task ...
Forget C-I-A, Availability Is King
In the traditional parlance of infosec, we've been taught repeatedly that the C-I-A triad (confidentiality, integrity, availability) must be balanced in accordance with the needs of the business. This concept is foundational ...

