night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
A Huge Stride To EMV In The US
A Huge Stride To EMV In The US

Regular readers of this blog will know that I have been writing about eating the US EMV elephant for some time.…

Read More
Warning: Are Your Keys Exposed In Public Google Searches?
Thales
Warning: Are Your Keys Exposed In Public Google Searches?

A researcher has revealed this week how easy it can be to find the private keys that are supposedly securing organisations’ sensitive data. No clever hacks or tricks of the…

Read More
Preventing Advanced Persistent Threats: Keep The Code Authentic

Code signing is one concept not earning enough attention amid all the coverage of advanced persistent threats (APTs). A main reason APTs are an issue is because attackers can…

Read More
New FFIEC Guidelines Make No Mention Of Strong Authentication
New FFIEC Guidelines Make No Mention Of Strong Authentication

On Tuesday the US banking regulator, the Federal Financial Institutions Examination Council (FFIEC),…

Read More
Key Management Strategies In The Cloud Part 4:Treat Your Cryptographic Keys As More Than Just Data
Thales
Key Management Strategies In The Cloud Part 4:Treat Your Cryptographic Keys As More Than Just Data

As the final in a series of posts on key management in the Cloud, following are the remaining three possible strategies that organisations could look to adopt when thinking…

Read More
Key Management Strategies in the Cloud Part 3: Trust Everyone, Trust No-one or Trust Someone
Thales
Key Management Strategies in the Cloud Part 3: Trust Everyone, Trust No-one or Trust Someone

Having outlined yesterday the need to take an information-centric approach to key management in the cloud, today I would like to share the first half of a series of six…

Read More