We’ve all heard the admonition, “Don’t roll your own encryption!”. That’s because it’s hard to get encryption right. Let’s take a moment to examine what that means exactly. Probably very few of us would set … Read More
Smart City Privacy Principles from the City of Portland
The City of Portland has been part of the national effort to create “smart cities” that operate on better data, and better automation. Smart City privacy has been a challenging area for many cities since … Read More
End-to-end encryption – Why HTTPS is not enough
Apple gets a lot of kudos in the security community about their approach to end-to-end encryption. WhatsApp and Signal made headlines in years past. Tozny develops encrypted data lifecycle management solutions providing encryption backed identity … Read More
MacOS High Sierra Authentication Vulnerability
Earlier today, news broke about a potential vulnerability in MacOS High Sierra. Learn what’s broken and how to protect your own computer.
php[architect]: The Journey to PCI Compliance
In the November edition of the monthly Security Corner column, Eric Mann covers the PCI standard and how developers can stay compliant.