WinMagic has been on a roll lately working with partners like Guidance Software and our ongoing relationships with HP, Lenovo and Motion Computing. We’ve also focused on our global growth this year expanding our business in India.
Next week we head to Boston, MA for the Campus Technology 2014 event. With a number of key customers that are in the education space, we have a solid grasp of the needs and complexity of dealing with data encryption in education.
A colleague brought the following Microsoft Security Advisory to my attention, that says “Microsoft is revoking the digital signature for four private, third-party UEFI (Unified Extensible Firmware Interface) modules that could be loaded during UEFI Secure Boot.”
At the end of June, WinMagic had the opportunity to attend Gartner’s 2014 Security & Risk Management Summit. After many sessions, meetings and cocktail receptions, we walked away a little wiser and informed. Over the next few weeks I’ll delve into some of the sessions we attended, and share some stuff we learned from them. But for this blog post, I thought it would be good to share some key highlights/data that we took in from the event.
In my last blog on computer forensics I addressed the question: does software Full Disk Encryption (FDE) Thwart Computer Forensics? To recap, a software encrypted drive could prevent effective forensics. However, if you have enterprise key management and forensics software that can interface with it to get the media encryption key (MEK) then it doesn’t have to be any more challenging than doing forensics on an unencrypted drive.