Posts Tagged ‘encryption’
Policy debt
Background When we talk about technical debt that conversation is usually about old code, or the legacy systems that run it. I’ve observed another type of debt, which comes from policies, and seems to be most harmful in the area of security policies. Firewalls or encryption? A primary purpose for this post is to put […]
Filed under: security | 4 Comments
Tags: change, compliance, culture, debt, encryption, firewalls, passwords, policy
Self Encrypting Drives
TL;DR Many SSDs are also Self Encrypting Drives (SEDs) they just need a few bits flipped to make them work. As the SSDs use encryption under the hood anyway there’s no performance overhead. Background This is something of an almanac post after a couple of days of prodding around the topic of PC device encryption. […]
Filed under: security | 3 Comments
Tags: BitLocker, eDrive, encryption, Opal, sed, ssd, TCG
At their re:invent 2014 show Amazon launched AWS Key Management Service (KMS), “a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys”. At launch the service supported EBS, S3 and Redshift. […]
Filed under: cloud, InfoQ news, security | 2 Comments
Tags: amazon, aws, cloud, encryption, HSM, KMS, security
Update (13 Mar 2014) – this presentation is also available on YouTube I did a presentation at the open source hardware users group (OSHUG) last night. Click to the second slide to get the TL;DR version: With more time I’d like to get some quantitative material on the memory footprint of various cipher suites and […]
Filed under: Arduino, BeagleBone, presentation, Raspberry Pi, security | 1 Comment
Tags: arduino, ARM, BeagleBone, encryption, IPSEC, keys, Raspberry Pi, RPi, security, SSH, SSL, tls
This isn’t a post about consumer DRM, which I think has been covered well enough before by Cory and others (though some of the Bob=Carol issues still apply). Enterprises have a load of stuff that they need to (or are obliged to) protect. This is a post about the issues that I see with entitlements […]
Filed under: security | 8 Comments
Tags: ADL, cryptography, DLP, DRM, encryption, ERM, idm, PKI