What’s with the TrueCrypt warning?
TrueCrypt, the free open source full disk encryption program favoured by many security-savvy people, including apparently Edward Snowden, is no more. Its website now redirects to its SourceForge page...
View ArticleCESG advice on securing Android in a BYOD environment
CESG, the infosec arm of GCHQ, has released updates to its advice on the secure use of Blackberry, Android and Chrome, to cover the latest versions. The advice is aimed at public sector use of BYOD at...
View ArticleCertificate-less authenticated encryption gets US patent
Connect in Private (CIP) has made two announcements today. The first is that it has received a US patent for its Certificate-less Authenticated Encryption (CLAE). The second is that Alexander Hanff has...
View ArticleIt’s time to ditch compliance because most companies simply ignore it
Many security experts worry that compliance is driving security rather than the other way round. Being compliant doesn’t mean being secure. But faced with the choice between the minimum to be compliant...
View ArticleEncryption in the Cloud
The pressure to allow staff to use cloud storage is enormous. Not only are there strong economic arguments and business benefits, they’re going to do it anyway. So just saying No is not really an...
View ArticlePass the password, please
We are told to use strong passwords – a long and random mix of uppercase, lowercase, numbers, punctuation and special characters. The reason is to make them difficult to crack. Well, that’s only half...
View ArticleThe Global Identity Foundation
The basis of all information security is the protection of confidential information from unauthorised access. This requires the ability to differentiate between authorised and unauthorised subjects....
View ArticleChina launches first quantum-enabled satellite
(… or, maybe not) Aside from the fact that it allows me to make a quantum joke, this article allows me to rant about quantum cryptography. Ever since I have started to research the security...
View ArticleSecurity implications of quantum computing
Recently there has been a spate of media articles on how quantum computing is going to destroy the security world as we know it. These articles are all based on one report that has estimated how long...
View ArticleCryptography and quantum computing
Yes, I know I complained about it at the beginning, and I’ve dealt with it elsewhere, but I suppose I really have to address it. (There actually are a number of issues about cryptography and quantum...
View Article