“It always seems impossible until it’s done.” – Nelson Mandela
Researchers at Google and the CWI Institute in Amsterdam recently announced that they had successfully found a SHA-1 collision. In other words, they found two messages that produce the same output when run through the SHA-1 hash algorithm. This is a...Read More →
The healthcare industry lives on the bleeding edge of mobility, claiming some of the most innovative and life-changing use cases for mobile technology. Security is a top concern for most industries, but this is especially true in healthcare. From patient records to payment information, healthcare organizations face strict regulation...Read More →
I have endeavored in this ghostly little essay to raise the ghost of an idea which has been haunting me these last few months.
The latest Hype Cycle for Emerging Technologies tells us that IoT is short of the Peak of Inflated Expectations and five to ten years from the Plateau of Productivity. But already it presents some wonderful cautionary...Read More →
In 2016, we witnessed the first massive Internet of Things (IoT) botnet attacks. In 2017, we may witness the first successful attempt to hold someone with deep pockets liable for the damages.
Or maybe we won’t.
For a variety of reasons, finding a sufficiently solvent defendant to stick with this kind of legal liability may be an...Read More →
Read More →
Who would have thought in this year 2016 (almost 2017) I would be writing a blog post about S/MIME? Having spent my formative computing years at cc:Mail (and later Lotus), I spent a lot of time working with public sector companies and espousing the wisdom of securing your email using this offshoot version of PKI. Later, I would work at...