Are You Keeping Your Encryption Keys Secure?

June 9, 2015 |
Decorative Image of padlock

Uber, the San Francisco company behind the popular ridesharing app, is one of Silicon Valley’s highest-valued startups. But it’s also no stranger to controversy, having faced regulatory opposition in many of the major urban centers it operates, as well as... Read More

What Can We Learn From the Carbanak APT?

June 2, 2015 |
Photo of person inserting a bank card into an ATM

Earlier this year, Kaspersky Lab reported the discovery of a new advanced persistent threat (APT) it dubs ‘Carbanak’. Assuming the firm’s intelligence is correct, this sustained cybercrime campaign may have cost banks, payment providers and other financial institutions as much... Read More

What’s the Actual Role of Compliance?

May 26, 2015 |
AWS Data Compliance: 4 Tips for Decreasing Audit Times

Not long ago, I claimed on this blog that compliance is dead. Obviously, my point wasn’t that standards such as HIPAA and PCI DSS aren’t necessary, or that they aren’t evolving, because they are – it was that organizations have... Read More