Several of the rules and regulations vital to a secure business hide behind obscure acronyms. Learn what they are and why your business should care about regulatory compliance.
Cryptography is hard. It’s a deep field filled with intense mathematics and littered with traps that can easily snare the unwary. That being said, there are critical crypto tools that help set even small businesses apart and help to protect the long-term viability of their enterprise.
Businesses of every size need to cope with the eventual loss or corruption of data or critical infrastructure. These are risks that impact the long-term viability of your business by threatening overall application integrity and business trust.
Ensuring that a modular architecture is also a secure architecture requires a development team to be principled and intentional throughout the engineering process. It is possible to leverage modular technologies and utilize tools like analytics engines and advertising without compromising user privacy.
Tozny’s CEO, Isaac Potoczny-Jones, will be presenting at the High Confidence Software and Systems Conference (HCSS) on May 9, 2017. Come learn about NIST’s Risk Management Framework and how you can apply it to your work. And if you happen to be out in Annapolis, meet up with Isaac at the conference! @SyntaxPolice
Applying NIST’s New Privacy Risk Management Framework (Abstract)
NIST’s influential cybersecurity frameworks have been a cornerstone of the certification process. …
To keep up in today’s competitive technology market, perfecting the user experience is a must; making added security measures a tough sell to leadership. We consistently see brands sacrifice security, adopting the attitude, ‘it won’t happen to me.’ But when it does (which it will), brands are unprepared and scrutinized for their lack of foresight.
Read the interview with Manuela Marques, tyntec’s Product Marketing Director and Isaac Potoczny-Jones, CEO of Tozny, …
JOSE is a solid standard. It’s been implemented widely and successfully by awesome protocol engineers, cryptographers, and developers.