Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: Encryption

Passwords – Once Again, Encore Une Fois, Noch Einmal …

– Not again. Yes, again. Randall Stross is beating the password drum again … and again … and again. I thought that he had put the matter to rest (see my November 24, 3008 column “Passwords – Déjà Vu All Over Again” and my October 4, 2010 column “Passwords … Here We Go…

Are Protected Data Safe?

– What am I missing? Time and time again the fortress approach to information security is trotted out in all its glory … only to be deflated by some easy, cheap way of getting to the crown jewels. So it is in a column by Jennifer Saranow Schultz with the title “Data Is Protected, but Is…

US Drones Hack: It’s The Same Old Story

– CNN reports that Iraqi insurgents were able to hack and view live feeds from US Spy Drones. The vulnerability was a non-technical one. The article summarized the issue as thus: The official said that many of the UAV feeds need to be sent out live to numerous people at one time, and encryption was…

Classy Data (pt. 2) – Context and Handling

– The category of a particular data item may have been carefully arrived at and cast in concrete, as it were. But data do not live in unchanging isolation, nor are they always used for the same purpose or in the same manner. …

Security Tidbits of Interest

– Did you know that Al-qaeda uses PGP? Analysts said that as-Sahab is outfitted with some of the best technology available. Editors and producers use ultralight Sony Vaio laptops and top-end video cameras. Files are protected using PGP, or Pretty Good Privacy, a virtually unbreakable form of…