Remove Computers and Electronics Remove Internet Remove Technology
article thumbnail

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

Most of us, by now, take electronic signatures for granted. Related: Why PKI will endure as the Internet’s secure core. Yet electronic signatures do have their security limitations. And PKI , of course, is the behind-the-scenes authentication and encryption framework on which the Internet is built.

article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

After a good start, the Internet-enabled, technological revolution we are living through has hit some bumps in the road. To celebrate Independence Day we want to draw your attention to five technologies that could improve life, liberty and the pursuit of happiness on the Internet. Onion networking.

Internet 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Blockchain Voting

Schneier on Security

But now I have this excellent paper from MIT researchers: “Going from Bad to Worse: From Internet Voting to Blockchain Voting” Sunoo Park, Michael Specter, Neha Narula, and Ronald L. Abstract: Voters are understandably concerned about election security.

article thumbnail

Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things

The Security Ledger

Vishik is a TCG Director and spent 14 years as the Director of Trusted Technologies at Intel. The post Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things appeared first on The Security Ledger. ” Vishik is a TCG Director and spent 14 years as the Director of Trusted Technologies at Intel.

article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

Before the Internet revolution, military-grade electronics were different from consumer-grade. That started to change in the 1980s, when consumer electronics started to become the place where innovation happened. The military responded by creating a category of military hardware called COTS: commercial off-the-shelf technology.

article thumbnail

Protecting Patients With Healthcare Cybersecurity

CyberSecurity Insiders

It also showcased how vitally important healthcare cybersecurity has become during the internet age. The healthcare industry is perpetually on the cutting edge of technology, but that doesn’t mean everything is shiny and new. Staying abreast of new technologies and new cybersecurity risks as they emerge. A Vulnerable Industry.

article thumbnail

MY TAKE: ‘Digital trust’ has a huge role to play mitigating cybersecurity threats, going forward

The Last Watchdog

Related: Leveraging PKI to advance electronic signatures. It used to be that trusting the connection between a workstation and a mainframe computer was the main concern. Then the Internet took off and trusting the connection between a user’s device and a web server became of paramount importance. Here are a few key takeaways.