7 Myths of Encryption

We get a lot of questions and concerns around encryption and how the implementation will affect the organization. Although people recognize the benefits of encryption, there are a lot of misconceptions around the notion of encryption and its impact within an organization.  It’s not to say that these misconceptions hadn’t been true once upon a time but with the evolution of technology, many of these “facts” have truly turned into something of the past. 

Waging the War on Passwords

We have seen large password hacks recently including: LinkedIn, eHarmony, and Yahoo. Hacks so large some in the industry call this the Password Wars. Unfortunately for the general public—we are losing. However, before the trumpets play, let’s give them a fight. Our feature blogger Darren Leroux has touched on this subject before and inspired me to really take a look at innovations that may change the way you secure your information. 

Enlightening Conversations

Last week I attended an event in Seattle; it was a small, intimate group setting where a number of vendors talked about IT security with key business leaders. It was an interesting day full of discussion around how to secure the enterprise ranging from the cloud to end point devices.

Happy Valentine’s Day – Why Marketer’s Love Data Encryption!

As Data breaches become more and more prevalent in today’s world it is worthwhile for Marketing and IT departments to band together to make a case for the implementation of full disk encryption in an effort to protect both privacy issues as well as brand equity. In my experience, most stakeholders understand data breaches can and should be avoided; but if they do occur, and and organization is viewed as having inadequate protection of customer and employee records, stakeholders and the public at large can be ruthlessly unforgiving. That’s where the rubber meets the road and companies can suffer a significant bottom-line impact of brand deterioration.

Encryption Alphabet Soup

Learning a multiplicity of acronyms is pretty much a requirement for navigating any discipline. Every field has its own set of acronyms and the sequence of 3 or 4 letters that usually make up the acronym most likely has a completely different meaning from discipline to discipline. Even within a discipline it is common to see the acronyms muddled together.

Can your encryption solution do Pre-Boot Network-based Authentication?

If you have been reading the various blog posts we’ve published over that past few months you’ve seen us talk about: smart cards, cloud computing security, BYOD, MDM, FDE, FEE and more. What we really haven’t delved into is one of the main differentiators we offer in the market and the fact no one has be able to offer the same level of security – Pre-Boot Network-Based Authentication.

What’s your P@ssw0rd?

I know I’m a little late to the party, but recently I’ve been giving more and more thought to the passwords I use to access the various sites and tools I use on a day to day basis. The main reason I started thinking about this is because of Google’s introduction of the 2-step verification process and a recent article in Wired in which Google has declared ‘war’ on the Password.

How SEDs Really Work

I have been working with hardware and software encryption for well over a decade now and I have seen countless power point presentations on the advantages of hardware encryption over software encryption.  Transparency, performance and security are the big three.

Why Apple Matters in The Enterprise

It’s always interesting to get into the Mac vs. Windows debate as it relates to the Enterprise. For the longest time, the corporate IT stack was predominately Windows-based, but not any more. With the introduction of the iPhone and iPad, Apple has seen its reach within the enterprise slowly grow over the past few years. 

It Really Can Be That Easy

As I mentioned in my previous blog post, I used to run a small encryption team at a large organization before I came to work for WinMagic. One of the key responsibilities we had was to generate FISMA (Federal Information Security Management Act) compliance reports for NIST SP 800-53, AC-3 and SC-13 controls. What does that mean? Essentially, these are reports that ensure key security standard requirements are met within the organization for Government regulatory purposes.