Entries by Fornetix

With Great Code Comes Great Vulnerability

How Auto Makers Are Working to Secure Connected Cars Last week, Fornetix attended the inaugural Auto-ISAC summit. “ISAC” stands for Information Sharing and Analysis Center. There are several long-standing ISACs for other industries including aviation, electricity, natural gas, and financial services. You can find the full list here if you are curious.

Adobe Product Security Team Accidentally Leaks PGP Private Key

Adobe’s Product Security Incident Response Team (PSIRT) accidentally posted their private key to the internet allowing anyone with access to either side of a conversation with the PSIRT to be able to decrypt the messages.  The Adobe security team was quick to revoke the PGP key, but it has left people with encrypted messages to […]

The Impact of GDPR and What Encryption Can Do About It

In April 2016, the General Data Protection Regulation was signed into law by the European Parliament and was enforceable as of May 25th 2018. This EU regulation lays out a wide number of policies that require businesses to protect personal data. Companies must have policies and technology controls to securely store or transfer personal data […]

Forced Features: Why Unwanted Upgrades Are Bad Security

The Telephonic Treatment Like most people who own one, we love our smartphones.  We love that we can use Activator to keep my phone from automatically playing music, even over Bluetooth.  We love that we can select text and move the cursor without leaving the keyboard.  We love having five icons on the dock, speeding […]

Data Breach Hits HBO: How Do We End This?

Today, HBO announced publicly that they have experienced a “cyber incident which resulted in the compromise of proprietary information.” Like many other companies, HBO also stated that “data protection is a top priority” and yet we have seen a common theme that has become more prevalent in recent years. Large companies have trouble protecting their […]

RackTop Teams with Fornetix to Create FIPS 140-2 Level 2 Compliant Encrypted Data Storage Solution

FULTON, Maryland, July 25, 2017 — Today, RackTop Systems announced the immediate availability of its advanced secure encryption service with support for external cryptographic key management powered by Fornetix® Key Orchestration™. The enhancement enables organizations to meet strict data-at-rest encryption requirements while providing effortless, unified management of encryption keys. RackTop’s advanced encryption service maintains the […]

The Strong Case for Interoperability, Part 1

What is interoperability and how did it get started? The idea of interoperability was born in the world of manufacturing. If you think back to before the industrial revolution, machines and inventions were created as one-off systems.