Sorry, you need to enable JavaScript to visit this website.

BROWSE OUR ELECTROBLOG

Find additional Electroblogs using the search box below.

Intel Kernel Memory Leak Flaw January 25, 2018

On January 3, 2018, the first major security vulnerability of the year was reported. According to technical researchers, a flaw was found in Intel, AMD and Arm core processors that allow kernel memory to be leaked, allowing personal information such as usernames, passwords, login keys and files…

read more
Blog
Google Questions Symantec’s Commitment to Trust Chain for Internet Users—Refuses to Recognize Validation Status Certificates September 29, 2017

In March, Google launched the latest salvo of their public feud with Symantec over risk management of HTTPS credentials. Google Chrome developers announced plans to stop recognizing all extended validation status certificates issued by Symantec-owned Certificate Authorities (CA). This mass…

read more
Blog
Security of Wireless Networks - an Oxymoron? September 08, 2017

Wi-Fi is a technology for wireless local area networking using radio wave transmission and based on the IEEE 802.11 standard. Wi-Fi is used widely in private homes as a convenient and inexpensive method of networking. Many businesses and public places provide Wi-Fi as an amenity for both…

read more
Blog
Safety, the 4th pillar of the CIA Triad? October 30, 2015

Every security engineer is no doubt familiar with the critical principles of security, namely the CIA Triad:  Confidentiality, Integrity and Availability (or, AIC Triad). [1]  If the Gartner Group has its way, there soon will be a fourth pillar to the CIA Triad:  Safety. …

read more
Blog
Data Provenance (DPROV) for Health IT October 13, 2015

Data Provenance (DPROV) in the health Information Technology (IT) context refers to the creation of health IT data and the tracking of its permutations throughout its life cycle.  As the demand for data exchange increases, the need for confidence in the “authenticity, trustworthiness and…

read more
Blog
Authenticator Management October 13, 2015

Until passwords are extinct, we must manage them. After passwords are extinct, we must manage their replacements.

For those familiar with the Federal Information Security Management Act (FISMA) evaluations, the concept of Authenticator Management should be familiar from the…

read more
Blog
Top