Clients field us questions on encryption constantly: What type to use, the differences between encryption-at-rest versus in transit, what qualifies as “strong” encryption under current best practices, key management, which encryption methods meet “government” standards so as provide “reasonable security,” recommendations for encrypted email vendors… the list goes on. However, a recent story focusing on EMV cards, which […]
Archives
Latest Posts
- CT Becomes the 5th State with a Comprehensive Data Privacy Law 09/29/2022
- Annual Review of Cryptocurrency 2018 – CLE Webinar now up 01/09/2019
- 2018 Compliance and Privacy Change – Year in Review 01/07/2019
- Webinar – 2019 Privacy, Compliance and Risk Management Strategies for Infosec Professionals 01/05/2019
- Annual Cryptocurrency Year in Review 12/12/2018
- Record HIPAA Violation Settlement – $16 million 10/17/2018
Of interest…
- With Cox V. Sony The Supreme Court Provides Yet Another Internet-Protecting Decision
- Techdirt Podcast Episode 449: The Dangers Of Product Design Liability For Social Media
- The New York Times Got Played By A Telehealth Scam And Called It The Future Of AI
- Daily Deal: Costco 1-Year Gold Star Membership + $20 Digital Costco Shop Card