Encryption: Backdoors That “Work” Don’t Exist Because They Are A Fantasy.

Last week, FBI Director James Comey told senators that encryption was making it harder for the FBI to do its job. To back his words, he brought up examples of instances where the agency couldn’t access electronic information despite having the legal right to do so. And while you won’t find many denying that this […] read more

Maybe FTC Should Take To Task Breached Companies Claiming To Take "Security Seriously".

Apparently, 2015 is the year when everything old is new again: the encryption wars are back and gaining acceleration; TV shows and movies that were laid to rest are rising from their graves; and classic data breaches are raring their heads as well. For example, the site databreaches.net notes that Human Resource Advantage sent an […] read more

Data Encryption: Creating Passphrases That You Can Memorize While Thwarting Would-Be Monitors.

Over at firstlook.org, The Intercept has an article on creating passphrases (not passwords) that are strong and memorizable.  The trick lies in the number of elements (that is, how many words are used in the passphrase) and randomness.  Indeed, the principle is not different from how encryption works to secure data.  For example, AlertBoot’s managed […] read more

Medical Laptop Disk Encryption: Valley Community Healthcare Reports Stolen (Unencrypted) Laptop.

One of the worst US states in which to have a data breach, especially a medical data breach, is probably California: in addition to federal HIPAA regulations, California has shown itself to be quite aggressive when dealing with medical entities that experience a data breach.  Indeed, there’s some (valid) criticism that the CA Dept. of […] read more

UK Laptop Encryption: ICO Warns Barristers And Solicitors To Secure Information.

The UK’s Information Commissioner’s Office (ICO) has recently issued a warning to people in the legal profession. According to an August 2014 news release, the ICO has seen a higher-than-expected-number of data breaches stemming from the actions of solicitors and barristers.  Normally, the recommendation would be to use data encryption software to secure sensitive files; […] read more