security

February 3, 2016
Feb 3, 2016

Security in the World of a Smart Home

Information Assurance has its pillars based in the 3 main tenants of C.I.A – Confidentiality, Integrity and Accessible.  Information is power in todays modern world, and in order for it to...
November 12, 2015
Nov 12, 2015

Privacy in Pole Position

Why privacy is becoming increasingly important for everyone from CIOs to end-users. Our clients are asking us for more and more expert advice on privacy. The most common questions are: “We...
June 30, 2015
Jun 30, 2015

Mobile Application Security by Design

Did you know that mobile security breaches have affected more than two-thirds of global organizations in the last 12 months? Our latest SlideShare presentation will help you assess where you stand,...
May 15, 2015
May 15, 2015

5 Ways to Invest in Privacy in 2015

Public perception of Privacy and Security in the post-Snowden era has changed, leading to end users caring vastly more about the topic. Last year there were more breaches than ever before, ad...
April 24, 2015
Apr 24, 2015

Can Someone Hack Your Banking App?

The banking industry is seeing a second wave of digital transformation with 20% or more of all transactions now occurring from mobile devices, a number that is rapidly increasing. The majority of all...
June 12, 2014
Jun 12, 2014

Moving out of Castles

For millennia people relied on fortresses to protect themselves and their valuables, allowing only trusted people in. This all-in-one protection method used “defense in depth” with walls, moats,...
May 8, 2014
May 8, 2014

Security breaches: Who’s to Blame?

Last week, I participated in a webinar about SC Magazine’s Breach Survey. The survey was sent to a group of Chief Information Security Officer’s and included security-related questions, such...
May 6, 2014
May 6, 2014

All you need to know about Privacy

In the last few months, privacy has been the focus of may discussions following huge data breaches making headline news the world over. Some examples of the latest data breaches: Heartbleed...
March 27, 2014
Mar 27, 2014

Do you Really need a Blackphone?

Edward Snowden spoke at SXSW conference.  He obviously didn’t fly to Texas, but instead spoke over Google Hangout from somewhere in Russia.  Many people’s perception of Snowden has evolved over...
February 21, 2014
Feb 21, 2014

RSA Mobile Security Panel | Rick Doten

On Monday, February 24, I’ll be speaking on a panel at the RSA Security Conference in San Francisco on a panel about Mobile Security.  This talk is part of the Trusted Computing Group (TCG)...