Clients field us questions on encryption constantly: What type to use, the differences between encryption-at-rest versus in transit, what qualifies as “strong” encryption under current best practices, key management, which encryption methods meet “government” standards so as provide “reasonable security,” recommendations for encrypted email vendors… the list goes on. However, a recent story focusing on EMV cards, which […]
Archives
Latest Posts
- CT Becomes the 5th State with a Comprehensive Data Privacy Law 09/29/2022
- Annual Review of Cryptocurrency 2018 – CLE Webinar now up 01/09/2019
- 2018 Compliance and Privacy Change – Year in Review 01/07/2019
- Webinar – 2019 Privacy, Compliance and Risk Management Strategies for Infosec Professionals 01/05/2019
- Annual Cryptocurrency Year in Review 12/12/2018
- Record HIPAA Violation Settlement – $16 million 10/17/2018
Of interest…
- Greater Than Zero: The Anti-AI Pushback On Gaming Preservation Efforts Makes No Sense
- Ctrl-Alt-Speech: Money For Nothing And Clicks For A Fee
- The Government Uses Targeted Advertising to Track Your Location. Here’s What We Need to Do.
- Prediction Markets Promised Better Information. Instead They’re Creating Powerful Incentives to Corrupt Information.