Encryption as Protection? Maybe Not

A recent espionage prosecution in West Palm Beach, Florida demonstrates that encryption may not be the panacea that organizations think it is.  So rather than relying on encryption alone, companies need to adopt and maintain strategies that continue to provide layered security. After every data breach, we hear the same mantra, “If only the data…

Details

Stagefright and Security Fright

A new vulnerability in the Android OS points out not only problems with hardware and software generally, but with our bug bounty and patch management system for mass-market consumer products – you know, exactly the kinds of products that most need a patch management program. The fact that the critical vulnerability was discovered and reported…

Details

It Ain’t Your Data

Your bank records.  Your medical records.  Your bills.  Your phone records.  Your college grades.  What do all these things have in common?  None of them are YOURS. The United States Court of Appeals in Atlanta reinforced this concept when it allowed the government to get access to what is called “historical cell site data” without…

Details

The IoT and The End of the Ownership Society

When I was a kid, I owned a rather substantial record collection.  It included The Who, Dylan, Simon and Garfunkel, and other groups popular in the late ’60’s early 70’s.  I owned books including my father’s Funk & Wagnall’s encyclopedias, and games including Risk and Strat-o-Matic.  Increasingly, these will be seen as remnants of a…

Details

Dixie Announces Secure Communications Device

Editor’s Note.  Please note that this article was published on the first day of the fourth month of the year.  Treat accordingly. With competition heating up for secure communications providers, including Hushmail, Wickr, SilentMail, Signal and others, the Dixie corporation announced its own foray into the crowded field. The Fort James Company, which owns the…

Details