The First Evil Maid-Proof Computer

It doesn’t matter how many bits your password has, how proven your encryption is, or how many TrueCrypt volumes are on your computer. If someone wants data off your device, they can get it if they have physical access to your device. This is the ‘evil maid’ security scenario, named after hotel maids on the payroll of a three-letter agency. If someone has physical access to a laptop – even for an hour or two – the data on that laptop can be considered compromised. Until now, there has been no counter to this Evil Maid scenario, and for good …read more

Continue reading The First Evil Maid-Proof Computer

What’s in Your Event Cybersecurity Strategy?

Event cybersecurity strategies and tools can help improve the digital security and, in turn, the physical security of guests at your event.

The post What’s in Your Event Cybersecurity Strategy? appeared first on Security Intelligence.

Continue reading What’s in Your Event Cybersecurity Strategy?