Key derivation function (KDF) can make the task of key management vastly easier and less expensive. Here's how to get started.
If the police can do it, so can thieves. Takeaway: Unmanaged BYOD is risky.
Format-preserving encryption (FPE) is key to protecting your legacy data while keeping your apps and network humming.
WPA3 is here. You'd better start planning for a new network kit.
What would you do if you had a saboteur? How would you know?
Here's why random key generation is necessary and how to measure if you are doing this well enough.
Don't just hide behind the "not a bug" reply. Protect your cloud customers!
It’s time to get ahead of the next tranche of regulations, but beware of lawyers playing it safe.
IT is predictably unpredictable, so whether or not blockchain will live up to the hype is anyone’s guess.
What other ancient software layers do you rely on? And to the security researchers: Enough with the hyperbole, already.