Category Archives: Encryption

Whenever I see a web site or hear a commercial touting how my personal information is secure because “we use encryption,” I just have to chuckle. I guarantee you that Target did — and does — encrypt your personal information … Continue reading

Posted in Encryption, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , | 2 Comments

A hot debate over the inherent security benefits of open source software — or lack thereof — has been raging (again) since the “heartbleed” bug came to light last spring. So…..from a security expert’s point of view (yes, mine!), is … Continue reading

Posted in Botz Blog, Cloud Security, Compliance, Encryption, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , , , , , , , , , , | 2 Comments

I find this authentication mechanism for accessing Web sites and which was proposed in October 2013 very interesting.  The main reasons it’s interesting are that it would be so much easier to register at Web sites, authentication is based on … Continue reading

Posted in Botz Blog, Encryption, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , | Leave a comment

I recently collaborated with Patrick Townsend, CTO Townsend Security, on an encryption key management white paper.  The paper is targeted at the IBM i audience but actually contains useful information for folks using any platform.

Posted in Botz Blog, Compliance, Encryption, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , | Leave a comment

Recently, I joined security expert Patrick Townsend as a co-presenter in a webcast covering our picks for the Top 3 IBM i Security Tips for 2013. Patrick’s a smart guy, and I always learn something when I talk with him. … Continue reading

Posted in Encryption, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , | Leave a comment

I read about this in Bruce Schneier’s monthly cryptogram newsletter.  It’s always jam packed with cool and interesting stories about information security.  I might learn more from this newsletter than most of the others I read combined! In the October, 2012 … Continue reading

Posted in Encryption, Info Security Mgmt | Tagged , | Leave a comment