Research Team PKWARE has a history of producing scalable, highly functional software and approaches to data storage, movement and encryption. With this post we are initiating coverage of PKWARE, tracking them in our Disruptive IT Directory in our sections on the highest performing Infrastructure ...
Posts Tagged: encryption
The growing gap between existing cybersecurity solutions and the sophistication of hacks is well known and has been widely publicized. Instead of just incremental catch-up activities, there is a push toward strengthening the overall security foundation within organizations. One such approach is thro...
An unavoidable fact of life is that data breaches can and will occur. The jury is still out on when and to what extent we will be able to reverse this situation. However, in the meantime, to avoid appearing on the “wall of shame” of major breaches that expose confidential information, you had be...
Picking up a newspaper and turning on the TV, one is instantly confronted with news of yet another cyber hack. With cyber attacks headlining the news, millions of people are concerned with whether their personal information has been breached. These attacks are becoming more and more sophisticated an...
By May Gourley If you’ve ever been worried that the messages you are sending your friends and co-workers via the normal texting applications were not secure enough and you felt unsafe giving out personal information, then Threema might be the application for you to use. What is Threema? Threema is...
By Bob Gourley Eddie Garcia is regarded as one of the nation’s greatest Big Data security architects. At Gazzang he led engineering teams through successful fielding of secure hadoop deployments where security was provided without sacrificing performance. Now a security engineer with Cloudera,...
With Edward Snowden’s revelations, the myriad of recent information breaches at large corporations, and the extraordinary level of digitalization in our country, the American public has never placed a higher value on cyber security. This heightened attention has manifested itself in recent actions...
While Apple has made many headlines this month for the release of its new generation of the iPhone, this week the company has caused quite a stir with its latest announcement regarding its desire to enhance the encryption that protects its smartphones. In its press release, Apple asserts that it has...