Keeping your business and personal instant messages secure

Most people want to know their instant messages are securely wrapped up—whether that’s for personal privacy or protecting business communications. There are a lot of solutions out there for better securing IMs.
Categories:

101
How-tos

Ta… Continue reading Keeping your business and personal instant messages secure

It’s A Wonderful Secure Life: A Christmas Classic Meets the IT Admin

    We are big fans of the Christmas pulp. It’s A Wonderful Life is high up on that list. We were wondering what it would sound like if George worked as an IT admin…and it was 2017. This is “It’s A Wonderful Secure Lif… Continue reading It’s A Wonderful Secure Life: A Christmas Classic Meets the IT Admin

New Part Day: A Truly Secure Workstation

There is a chain of trust in every modern computing device that starts with the code you write yourself, and extends backwards through whatever frameworks you’re using, whatever OS you’re using, whatever drivers you’re using, and ultimately whatever BIOS, UEFI, Secure Boot, or firmware you’re running. With an Intel processor, this chain of trust extends to the Intel Management Engine, a system running independent of the CPU that has access to the network, USB ports, and everything else in the computer.

Needless to say, this chain of trust is untenable. Any attempt to audit every line of code running in …read more

Continue reading New Part Day: A Truly Secure Workstation