Security

On March 1, a group of researchers working in academia and the tech sector released news that over a third of the servers on the internet are susceptible to having their secure traffic decrypted were it to be intercepted.  Welcome to CVE-2016-0800, the DROWN attack. Anyone who’s been...

Scale Venture Partners was bogged down in the morass of cybersecurity.  Like most companies today, they use a lot of different systems.  As the layers of technology increased, so did the complexity of their security challenge.  Additionally, their users were increasingly mobile, compounding the difficulty of keeping every...

Last week, Google released information on its efforts to comply with a May 2014 European Court of Justice ruling which implements the so-called “right to be forgotten” across the internet.  In the case, a Spanish national sued for the removal of search results which led to newspaper announcements about...

The Paris attacks rekindled a long-standing debate between governments and technology companies over the proper use of encryption technology.  With terrorists using ever more sophisticated means to disguise their online identities and activities, a societal discussion about the boundaries of civil liberties and effective national security...

It's the most wonderful time of the year - or getting close to it.  Now is when the holiday decorations start to appear before we're ready for them, every drink gets a dash of peppermint, and we get ready for the all-carols radio station switch.  Aside from...

It was inevitable:  cybersecurity is now a commodity.  As hacks and data breaches become ever more common, the industry which deals with those threats has become ever more standardized.  Where companies once balked at employing anyone to look at cybersecurity, they now include it as a regular operating...