Cryptography was originally developed to secure communications, i.e., data in transit (alternatively, data in motion)….
Blog Posts
Back in 1998 I went onto AskJeeves in search of a local store where I…
It is time for an update on the Baseline Requirements for Code Signing. First the…
Emerging vulnerabilities underscore the argument for creating a safer Internet for everyone including domain owners…
As hubs of research, academia and culture, colleges have been targets of hackers on more…
Many public transit infrastructures around the world are in the midst of big technological upgrades….
The Severn Area Rescue Association (SARA) is the largest independent lifeboat service in the U.K., providing inshore…
As complex and sensitive data transactions play an ever-expanding role in today’s world, users of…
We are at the cusp of an era where our lives will rarely depart from…
In recent years, cyberattacks against law firms have managed to mostly slip under the radar….