Encryption

This week I am talking to Kim Biddings, VP of Product for BIO-key (@BIOkeyIntl) a company focused on providing tools to uniquely and securely identify individuals to allow secure access. Kim is an expert in cybersecurity, biometric identification, and Identity and Access Management, and also a pastry chef in the making. We talk about the importance of security in […]

Read

3 Minutes to Financial Ruin     This past week I found myself subject to a SIM Jacking attack. A reasonably sophisticated attempt to wrestle control of someone’s life, typically for money, although in some cases it can be for high-value digital assets (like a Twitter handle back in 2012). But even in those cases […]

Read

Encryption Algorithms Under Siege Over the course of history, the development and subsequent breaking of encryption standards have been a constant cycle. As new keys were developed so they were broken and the speed of with which new keys were broken has increased. Modern day encryption “Data Encryption Standard” or DES was launched int he […]

Read

Hollywood Future Predictions Spoiler Alert – for anyone who has not watched the Showtime series “Homeland” or not got past Season 2 In the episode titled “Broken Heart” (December 2, 2012) we watch a hacker gain remote unauthorized access to the Vice Presidents Pacemaker and induces a tachycardia (increase in the heart rate) causing him to […]

Read

I was reminded of there Jerry Maguire movie clip when I read the latest in a long line of security breach stories – this one emanating from Canada where this group is in hot water over a massive 620,000 patient data breach…taking 4 months to notify authorities. Apparently Canada does not have a national Breach […]

Read



Search