In the News

Decrypt This: Professional-Grade Encryption for the Average Person

Date Published: December, 01, 2014

Author: Chris Stobing On one muggy morning in June of 2013, a journalist for the news organization The Guardian rolled out of her bed, and opened her laptop. On it was an email from an address she didn’t recognize, with a message from a man she’d nev… READ MORE

The Fundamentals of FDE: Comparing the Top Full Disk Encryption Products

Date Published: December, 01, 2014

Author: Karen Scarfone Full disk encryption (FDE) is widely used on a variety of desktop and mobile device operating systems. This technology helps secure important information and prevents breaches by encrypting all of the data on a hard drive at rest. … READ MORE

Secure is the New Black: The Evolution of Secure Mobile Technology for Government Agencies

Date Published: June, 01, 2014

Author: Nate Rushfinn The CSD 3324 telephone and fax system has provided the Department of Defense (DoD) with secure voice and fax communications for years. Using the AES 256-bit encryption algorithm and the Diffie-Hellman key exchange, this old work hor… READ MORE

Making Security Part of the Government Mobility Game Plan

Date Published: June, 01, 2014

Author: James Poole In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security chal… READ MORE

TCG Releases TPM 2.0 Specification for Improved Security

Date Published: April, 01, 2014

Author: Warwick Ashford The Trusted Computing Group (TCG) has announced the availability of the Trusted Platform Module (TPM) 2.0 library specification. TPMs are designed to provide a secure root of trust to protect data in computers and mobile devices … READ MORE

Citizen Apple: A Spotty Record of Giving Back to Tech

Date Published: April, 01, 2014

Author: Paul F. Roberts Apple is the world's most valuable company - and one of its wealthiest. The Cupertino, Calif. firm reported a quarterly net profit of $13.1 billion on record revenue of $57.6 billion in its most recent fiscal quarter and is engage… READ MORE

“Cold” Topics at RSA that Should Receive More Attention

Date Published: February, 01, 2014

Author: Jon Oltsik The industry should be talking about the security skills shortage, open security standards, and automation but these subjects will get minimal lip service. In my blog yesterday, I outlined the hot topics I anticipate at this year's RSA… READ MORE

Storing Data In Insecure Times

Date Published: February, 01, 2014

Author: Tom Coughlin The Trusted Computing Group (TCG) session at the RSA Conference in San Francisco brought together proponents of standardized security technology with interested technology developers and end users. In the introductory talk by Dr. Jo… READ MORE