Author: Alan Kessler

Categories : Data Security            Leave a comment           

The roots of encryption go deep into human history. Encryption has been used for centuries to encode messages, usually to keep government secrets, but also to protect business or trade secrets such as the formula to make silk or pottery. Early encryption was fairly simplistic, largely relying on paper and pencil techniques like steganography, transposition and substitution. In the last century, encryption methods have advanced at a rapid clip, first by leveraging automation and the use of machinery and then […]

Categories : Data Security            Leave a comment           

If you can believe it, it’s been 10 years since Steve Jobs introduced the first iPhone. It was sold only by Cingular Wireless (AT&T), and used GPRS and EDGE for data transfer. Needless to say, much has changed since then. And mobile computing isn’t the only technology that has captured attention and taken hold in the enterprise. As we look at how recent technology advancements have impacted the industry, we should also note that it has greatly affected every organization’s […]

Categories : Data Security            Leave a comment           

RSA Conference 2017 is about to begin, and could data security be any more relevant today? I know I could say that every year – indeed in the lead up to RSA Conference 2016, I wrote about people recognizing data breaches as part of their daily lives. But a lot can happen in a year. Data security is headline news every day, multiple times a day. This year Thales comes to the world’s largest security conference with two priorities in […]

Categories : Data Security, Encryption            Leave a comment           

In 2016, we saw organizations increasingly investing in a digital transformation strategy and any CIO worth their salt is going to continue to drive that change through 2017. In fact, Gartner’s 2017 CIO agenda survey found that more money is being invested into technologies that support shifts to digital services than in the past. At the same time, the board is increasing the pressure on CIOs to move the organization forward technologically in order to better compete in this ever-increasing […]

Categories : Data Security            Leave a comment           

In looking back at 2016, it’s hard to imagine that any of us would have contemplated the impact of the Wiki leaks email and the implications that a foreign government was involved – and could have influenced the outcome of the U.S. presidential election. For the first time in U.S. history, cybersecurity played a significant role in global politics. Throughout the election process, the public was bombarded with private communications made available through a hacked DNC network and the hacked […]

Categories : Data Security, Key Management, Mobile Payments, PCI DSS            Leave a comment           

It’s officially the first of November, which means the holiday shopping season is almost upon us. With Black Friday and Cyber Monday rapidly approaching, there’s no better time to discuss our evolution towards a digitally-oriented consumer shopping experience – and what it means for merchant and customer security. Click to Tweet: Securely Swiping for Holiday Sales @kessalan bit.ly/2eVezle pic.twitter.com/ltz5YNarBq Just a decade ago, walking into a mall or local shop and handing over cash or a credit card to a […]

Categories : Data Security            Leave a comment            Tags: , , , ,

As some of you may be aware, October is National Cybersecurity Awareness Month.  The theme for this week, specifically, is STOP. THINK. CONNECT: The Basic Steps to Online Safety and Security. Part of this week’s focus includes examining “cybersecurity jobs and how to engage young people in pursuing careers devoted to protecting the Internet.” The weekly topic, and the entire month’s devotion to cybersecurity, compels me to consider my cybersecurity “ah-ha” moment (We’re talking pre-Edward Snowden; pre-cybersecurity “skills gap”; pre-Target). […]

Categories : Data Security            Leave a comment           

In late August, news outlets reported a group calling itself the “Shadow Brokers” had leaked a hacking tool belonging to the NSA’s Tailored Access Operations (TAO) team, otherwise known as the Equation Group. According to the New York Times, the leaked code “was designed to break through network firewalls and get inside the computer systems of competitors like Russia, China and Iran. That, in turn, allows the N.S.A. to place ‘implants’ in the system, which can lurk unseen for years […]

Categories : Data Security            Leave a comment           

Laptops. Tablets. Smartphones. Thermostats. Fitness trackers. Insulin pumps. Cars. Welcome to connected (almost) everything. Increased connectivity means a lot more data. A lot more data means the need for data protection…and  trusted relationships between the providers of that data, the consumers of that data and the conduits for that data. The past decade’s explosion of data can modestly be called a digital transformation, a transformation that is driving new business models and revenue and making possible whole new ways of […]

Categories : Data Security            Leave a comment           

In April, IDC predicted the IoT would be a $1.46 trillion international market by 2020 (up from $700 billion last year). To say there is ample business opportunity would be a titanic understatement. However, the IoT should not be viewed as a promised land of free profits, open to all who care to play there. To borrow from Voltaire or Spiderman (low-brow or high-brow, take your pick), “with great power comes great responsibility.” Remember the BYOD conversations from 10 years […]