Blog
The Role Encryption Plays in Protecting Healthcare Data, Driving Innovation
As the healthcare industry continues to go digital to meet patient demand and data-driven regulations, it has been heavily targeted by hackers, as patient records…
The Holy Grail of Encryption
Today, Baffle reached another milestone by delivering first-to-market capabilities enabling wildcard search on AES encrypted data without requiring any modification to an application. Achieving this…
CISOs Brawl it Out at RSA
Chairs were thrown. A table was flipped. Someone broke a bottle. And a portable LED projector got a scratched lens. Ok, it didn’t quite happen…
Vulnerabilities Come in Waves
VULNERABILITY WAVE EXAMPLES In April 2014, a two year old zero day vulnerability was discovered in OpenSSL. Heartbleed represented a new finding in TLS implementations…
Overcoming the Push and Pull Between Business and Security
This morning, an article I wrote for Dark Reading called “Is Security Accelerating Your Business?” was published. Here is the link to the full article….
Securing data against Meltdown and Spectre with Multi-Party Compute (MPC)
The New Year has brought to light a significant vulnerability in processor architectures. In the desire to improve performance, memory isolation, which is one of…
Here comes GDPR, are you ready?
Today is May 25, 2017 – we are exactly one year away from the implementation of the most stringent privacy regulation ever enacted – the…
Why Is Homomorphic Encryption Not Ready For Primetime?
First a short lesson in history: In 1978, just a year after the RSA public-key scheme was developed, Rivest et al. published “On Data Banks…