Articles on Encryption
Below are my perspectives on Encryption, drawn from my work as a security leader and practitioner.
- Privacy Security of Third-Party Keyboard Apps on Mobile Devices Keyboard apps offer better predictions, voice transcription, and AI-powered writing, all requiring users to send what they type to remote servers. Mobile OS vendors set the rules but can't enforce...
- Malware 11 Recommendations for Coming Up to Speed on Bitcoin Bitcoin represents a precursor to future distributed online payment approaches. Security implications include compromised computers being used for mining, trojans designed to steal Bitcoin wallets,...
- Risk Management Understand the Risks of Email Search Add-Ons and Services Cloud email search tools like Greplin and Xobni index messages and contacts across services, creating attractive targets for attackers. Most vendors provide little detail about security measures....
- Malware Respect the Browser - Security Awareness Recommendations Six brief browser safety recommendations for non-technical users: use bookmarks to avoid typosquatting, patch browsers and add-ons automatically, ensure HTTPS for sensitive data, log out properly,...
- Encryption Fun Ways to Change Behavior and Improve Security Fun can act as positive reinforcement for security behaviors—more powerful than negative reinforcement. Ideas include rewarding badge swipes with jokes, entering complex password users in raffles,...
- Tools How to Design Security Warning Messages to Protect Users Effective security warnings make the safest button most visible, stay brief while providing context, avoid technical jargon, and don't overwhelm users with repeated prompts. Microsoft's "Enable...