- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
![Smartphones: The Next Hacker Heaven?](/sites/default/files/content/blog/field_image/2020-03/matrix_78.jpg)
Data breaches have certainly dominated the headlines during the past few months. The dust hadn’t settled around Stuxnet when the Sony and RSA incidents occurred. We have also…
Read More![A Huge Stride To EMV In The US](/sites/default/files/content/blog/field_image/2020-03/matrix_79.jpg)
Regular readers of this blog will know that I have been writing about eating the US EMV elephant for some time.…
Read More![Warning: Are Your Keys Exposed In Public Google Searches?](/sites/default/files/content/blog/field_image/2020-03/matrix_80.jpg)
A researcher has revealed this week how easy it can be to find the private keys that are supposedly securing organisations’ sensitive data. No clever hacks or tricks of the…
Read More![](/sites/default/files/default_images/matrix.jpg)
Code signing is one concept not earning enough attention amid all the coverage of advanced persistent threats (APTs). A main reason APTs are an issue is because attackers can…
Read More![New FFIEC Guidelines Make No Mention Of Strong Authentication](/sites/default/files/content/blog/field_image/2020-03/matrix_82.jpg)
On Tuesday the US banking regulator, the Federal Financial Institutions Examination Council (FFIEC),…
Read More![Key Management Strategies In The Cloud Part 4:Treat Your Cryptographic Keys As More Than Just Data](/sites/default/files/content/blog/field_image/2020-03/matrix_81.jpg)
As the final in a series of posts on key management in the Cloud, following are the remaining three possible strategies that organisations could look to adopt when thinking…
Read More