What CISOs must learn from Bitcoin and a research team at Georgia Tech

By Seth Hallem, originally published in HelpNetSecurity, Sept. 16, 2013

It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. While vastly different in their nature, both point to a fundamental lesson that CISOs in an increasingly mobile world cannot ignore – when it comes to encryption, read the fine print. Otherwise you may find yourself up the proverbial creek without a paddle (i.e., remediation strategy).

Continue reading

Biggest Challenge: Security Management – 2015 ILTA Technology Purchasing Survey

The 10th Annual 2015 ILTA / InsideLegal Technology Purchasing Survey was released at ILTACON last week. It’s a quick read and I recommend taking a look at the entire report.

As an introduction to the tech survey, I’ve highlighted the five points that I found most interesting and indicative of our times.

Continue reading