Date Published: December, 01, 2014
Author: Chris Stobing On one muggy morning in June of 2013, a journalist for the news organization The Guardian rolled out of her bed, and opened her laptop. On it was an email from an address she didn’t recognize, with a message from a man she’d nev… READ MOREDate Published: December, 01, 2014
Author: Karen Scarfone Full disk encryption (FDE) is widely used on a variety of desktop and mobile device operating systems. This technology helps secure important information and prevents breaches by encrypting all of the data on a hard drive at rest. … READ MOREDate Published: June, 01, 2014
Author: Nate Rushfinn The CSD 3324 telephone and fax system has provided the Department of Defense (DoD) with secure voice and fax communications for years. Using the AES 256-bit encryption algorithm and the Diffie-Hellman key exchange, this old work hor… READ MOREDate Published: June, 01, 2014
Author: James Poole In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security chal… READ MOREDate Published: April, 01, 2014
Author: Warwick Ashford The Trusted Computing Group (TCG) has announced the availability of the Trusted Platform Module (TPM) 2.0 library specification. TPMs are designed to provide a secure root of trust to protect data in computers and mobile devices … READ MOREDate Published: April, 01, 2014
Author: Paul F. Roberts Apple is the world's most valuable company - and one of its wealthiest. The Cupertino, Calif. firm reported a quarterly net profit of $13.1 billion on record revenue of $57.6 billion in its most recent fiscal quarter and is engage… READ MOREDate Published: February, 01, 2014
Author: Jon Oltsik The industry should be talking about the security skills shortage, open security standards, and automation but these subjects will get minimal lip service. In my blog yesterday, I outlined the hot topics I anticipate at this year's RSA… READ MOREDate Published: February, 01, 2014
Author: Tom Coughlin The Trusted Computing Group (TCG) session at the RSA Conference in San Francisco brought together proponents of standardized security technology with interested technology developers and end users. In the introductory talk by Dr. Jo… READ MORE