The hardware roots of trust

The hardware roots of trust

With recent revelations that some chip manufacturers are working with National Security Agency (NSA) to insert backdoors and cryptographic weaknesses into their products, what due diligence should be done to ensure hardware security? ...

04/27/15

Working backwards

Working backwards

This article describes the method of "working backwards" to envision a worst case scenario and then systematically place controls in place that would have prevented the worst case scenario from occurring.

03/23/15

Re-thinking development aid in the digital age

This article argues that international aid to developing countries should be updated for the digital age. Information security is key to protecting the critical infrastructure, digital economy and individual on-line human rights in...

02/05/15

Load More