Big thank you to CARTES America 2014 for hosting my presentation, Using NSA Tradecraft to Protect Data on Mobile Devices. And who doesn’t love visiting Las Vegas before it gets really hot? All of the slide decks from CARTES America 2014 are available here.
Network security requires both top-down and bottom-up thinking. Read more about securing network endpoints in the 25th edition of the JW Secure Informer.
Reminder to those attending RSA in San Francisco this week: the below session is this morning and is free to Expo pass holders. In addition to the 10am panel, we’ll also be demonstrating the JW Secure StrongNet solution interoperating with a Continuous Monitoring agent from Microsoft Trustworthy Computing. Consistent with the theme of the TCG […]
Get Proactive with Security: Using Trusted Computing to Free Security Resources for the Day-to-Day Fires
Coming to RSA in San Francisco this year? The conference organizers would like to remind you that there is compelling content on the first day of conference, Monday, February 24, 2014. And an expo pass is enough to get you into these… any you get a free lunch! I’ll be participating in the following moderated […]
The secret to protecting big data isn’t to put it under a big tarp. Or to guard it with a big dog. No! The secret to protecting big data is encryption. And you don’t even need big encryption. Just regular encryption will do it. Information security is all about the basics: access control, authorization, confidentiality. […]
My Microsoft MVP-ness got renewed for the sixth consecutive year! I’ve been keeping busy. Check out my public MVP profile; it lists the technical community-oriented activities that have made me worthy.
Our rock star technical team has just grown to include fellow ex-MSFT colleague Jeff Sigman! Jeff started at Microsoft in 1997 and spent most of his 16 year career in the Windows division focused on networking and security. His work can be seen in every major Windows release since Windows 2000 and included software development […]
Thank you very much to the NYU-Poly THREADS conference organizers for hosting the DARPA Cyber Fast Track presentations yesterday. It was an honor to be among the CFT awardees, and an honor to be on the THREADS list. If you missed my presentation and/or want to review the slide deck, it’s below. Secure Endpoints, Secure […]
Usability and security are one of the classic tradeoffs in software design: it’s rarely possible to optimize both. But just like a fader on a mixing board, there’s an ideal balance. You just have to take the time to listen and find it. Want to learn more about how to dial in the usability and […]
I’ve written before about the importance of protecting data on the move in scenarios such as a traveling executive. Imagine the potential damage to reputation and future revenue if a laptop is left in the back of a taxi, and the hard drive is filled with acquisition plans, product source code, emails to the board […]