Skip to main content

Posts

Showing posts from January, 2019

Deleting Data for GDPR: Could encryption do the trick?

Deleting Data for GDPR: Could encryption do the trick?
A new article in CIO magazine proposes an outside-the-box method for GDPR data deletion. Here’s why that’s not a good idea… After writing exhaustively about GDPR compliance for the better part of 2018, we figured why not kick 2019 off with a little more discussion about the EU’s General Data Protection Regulation. Specifically the “right to erasure,” and what that actually portends for most organizations.
Let’s be honest, while the GDPR’s right to be forgotten/right to erasure are a big win on the side of personal privacy, from a business standpoint this is a huge pain in the rear. I know this because I help handle deletion requests for The SSL Store and its subsidiaries. I see it first-hand. And generally the folks requesting the deletion are less than polite. They’re often disgruntled and generally threaten to be litigious.
The point I’m making is that despite what it does for personal privacy, these edicts are not business-fri…

Firefox will soon warn you about the Man-in-the-Middle

Firefox will soon warn you about the Man-in-the-Middle
Firefox 65 will provide users with more information when something gets in the middle of their connection Mozilla will now give its users more information when a Man-in-the-Middle scenario occurs with the release of Firefox 65. Previously, the browser had issued a warning when a MITM occurred, but failed to give much insight into what was happening.
That’s all about to change.
With the release of Firefox 65, users will now get more information about who may be attempting a MITM.
So today we’ll discuss this new feature, Man-in-the-Middle scenarios in general and how this may impact your organization.
Let’s hash it out.

Should we refer to Man-in-the-Middle as an attack? If you’re a regular reader you know we talk about Man-in-the-Middle scenarios quite a bit. We’ve covered what MITM is. We’ve covered how easy it is to pull one off. Now let’s discuss whether or not it’s really accurate to refer to this as an “attack.”
And the answe…