The recent Equifax hack reminds us just how vulnerable our information can be if the hands that hold it fail to properly secure that data.
Several of the rules and regulations vital to a secure business hide behind obscure acronyms. Learn what they are and why your business should care about regulatory compliance.
Cryptography is hard. It’s a deep field filled with intense mathematics and littered with traps that can easily snare the unwary. That being said, there are critical crypto tools that help set even small businesses apart and help to protect the long-term viability of their enterprise.
Businesses of every size need to cope with the eventual loss or corruption of data or critical infrastructure. These are risks that impact the long-term viability of your business by threatening overall application integrity and business trust.
Ensuring that a modular architecture is also a secure architecture requires a development team to be principled and intentional throughout the engineering process. It is possible to leverage modular technologies and utilize tools like analytics engines and advertising without compromising user privacy.
Here’s a great article by George V. Hulme, including discussions with Tozny CEO Isaac Potoczny-Jones about the tension between Agile, MVPs, and Security. See also the complete Q&A with Isaac at CSO Magazine.
The first step is just saying, “We’re going to include security in the Agile definitions of done,” and once you’ve at least penetrated that level, which I don’t think a lot of people have, …
Galois and its partners will build a tool that relies on biometric authentication to enable the storing and sharing of private information online. …
The National Institute of Standards and Technology (NIST) just announced that Galois (Tozny’s parent company) received a grant from the National Strategy for Trusted Identities in Cyberspace (NSTIC)!
Tozny CEO, Isaac Potoczny-Jones, will be leading the project and Tonzy will be a part of the pilot.
Read the full press release here.
Galois, Inc. (Portland, Ore.: $ 1,856,778) Galois will build a tool to allow users to store and share personal information online. …
In August, Software Magazine published Tozny CEO Isaac Potoczny-Jones’ article on building security into the software development lifecycle. His key point is that the market demands of software development encourage leaving security to the end user for a variety of reasons:
Tozny CEO, Isaac Potoczny-Jones, was interviewed via Skype by KATU news to comment on about Rapid7’s case study on security vulnerabilities for baby monitors.
Key points to highlight:
Why is cybersecurity such a hard problem? The US government, its citizens, and the organizations that write software are all on the same team, but in many cases, our interests are just not aligned. For instance, there have been endless political and social disagreements about the best way to share cyber threat intelligence without sacrificing consumer privacy.
It’s these competing concerns that are the kink in our collective armor and that’s what our adversaries exploit, …
This past week, Tozny CEO, Isaac Potoczny-Jones spoke on cybersecurity policy and law for the Pacific Northwest Defense Coalition and Pacific Northwest Aerospace Alliance. The talk was part of the 2015 Aerospace & Defense Symposium held at Joint Base Lewis-McChord.
Isaac shared the stage with Peter S. Chiou, Principal Strategist and Business Development Manager for Azure DoD, Microsoft and Special Agent Joshua Michaels of the FBI Cyber Task Force. …
Tozny CEO, Isaac Potoczny-Jones was quoted today in an article by Wayne Havrelly at KGW about the Internet of Things.
“Any system, as it gets more complex, the likelihood of a weak link in the chain grows,” said Isaac Potoczny-Jones, computer security expert with Galois. “So as cars get these integrated entertainment systems or wireless features, these open up avenues of attack.”
Read the full story on “How Safe is ‘Smart’ …