This is Voltage Security's Typepad Profile.
Join Typepad and start following Voltage Security's activity
Join Now!
Already a member? Sign In
Voltage Security
Recent Activity
I tried to read and understand the EU's recent Opinion 05/2012 on Cloud Computing (PDF) but apparently wasn't in the mood to understand such rules and regulations. Maybe I'll try again tomorrow. Until then I'll have to be satisifed with the visualization of the document that I created with Wordle. That's something that I can understand. Even before drinking a few cups of coffee. If you think you might be interested in this document, here's its executive summary to give you an idea of what it covers: In this Opinion the Article 29 Working Party analyses all relevant issues for... Continue reading
Posted Jul 18, 2012 at Superconductor
What book by Hemingway is this? (2)(1/2) + (1/2)(0) Continue reading
Posted Jul 2, 2012 at Superconductor
I just got one of the most unusual spam messages ever. Here's what part of it said: We are currently in need of the following worker for our company here in United States The American Fish and Seafood Company network currently operates six (6) large distribution/operation facilities to provide the logistic capabilities to deliver any kind of fresh or frozen seafood product, anywhere, in the freshest possible condition. And one of the jobs that this message invited me to apply for was "Fish Packing Executive." (This did actually sound more interesting than the inquiries that I get from headhunters asking... Continue reading
Posted Mar 7, 2012 at Superconductor
It is interesting to note that RSA is no longer involved in email encryption nor in delivering the next generation of public key cryptography and key management - it took just 33 years to slide from the peak of innovation.
New innovation and emerging technology brings with it opportunities for streamlining costs, eliminating hurdles for end users and reducing risks to the business. However, implementing game changing solutions can be unique to your environment, policies and processes. That's why I invite you to join Voltage Security at its first customer summit in New York City on November 9, 2011. The summit will focus on data-centric security and will feature top Voltage customers such as Amex, Wells Fargo, State Street and others, who will discuss how they implemented encryption projects for mail, data and payments. Also presenting will be Eric Ouellet,... Continue reading
Posted Nov 8, 2011 at Superconductor
Voltage Security invites you to "Voltage Security Live 2011" at Bridgewaters in New York City on November 9, 2011. This customer summit will focus on data-centric security and will feature several leading Voltage customers, such as American Express, Wells Fargo, State Street and others, who will discuss how they have implemented encryption projects for email encryption, data-centric encryption and end-to-end payment encryption. Also presenting will be Eric Ouellet, research vice president with Gartner Group, who is currently working on a new analysis of how companies use encryption. The goal of the summit is to enable Voltage customers to network with each other and pick up valuable best practices. Continue reading
Posted Oct 27, 2011 at Superconductor
To some, mainframes are seen as dinosaurs, technology that is obsolete or should be. However, this veteran platform has shown its resilience in enterprise computing for a reason. The benefits it offers to the corporate infrastructure - extreme scalability, high throughout, high availability - are matchless. However, as IT executives responsible for running mainframes or other platforms with z/OS can attest - there are issues regarding complexity. For example, traditional encryption solutions can require hundreds of lines of code to acquire and store keys and perform cryptographic operations. And that isn't even the biggest problem; it's the knowledge required of... Continue reading
Posted Oct 11, 2011 at Superconductor
At the J.P. Morgan Technology Innovation Symposium, yesterday afternoon, JPMorgan Chase inducted Voltage Security into its Innovation Hall of Fame in front of hundreds of Silicon Valley executives. Only two vendors were selected in this year's awards which recognize top emerging technology vendors for business impact, measured in terms of driving value for the firm, disruptiveness of technology and the overall quality of the partnership. Voltage was selected by top IT executives at JPMorgan Chase for its innovative data-centric encryption approach for protecting structured and unstructured data across datacenters, the cloud and mobile devices. "In an environment of ever-increasing threats,... Continue reading
Posted Oct 5, 2011 at Superconductor
Posted by Terence Spies, CTO of Voltage Security: Just a quick note to congratulate one of our intrepid engineers, Tom Wu. He's now a world record holder for finding the largest Non-trivial Gigantic Prime (which is also the largest "generalized repunit" prime.) There's a large community of people competing to find really, really large primes using various mathematical techniques -- a competition that suits people that work on things like cryptography. The primes that these folks are working with are even more gigantic than the primes that are used in cryptography. In Tom's case, he got his record by proving... Continue reading
Posted Sep 6, 2011 at Superconductor
Over the past 10 years, IBE has become the one of the fastest deployed encryption technologies as measured by the commercial adoption of Voltage SecureMail™ and the use of IBE as a general purpose key management solution used across the Voltage Security product line. Since its commercial launch 8 years ago, Voltage SecureMail has become one of the most widely adopted secure email products in the world with over one billion secure business emails sent annually and over 50 million worldwide users; those numbers are expected to double by 2014. Continue reading
Posted Aug 23, 2011 at Superconductor
Verizon's recent 2011 Data Breach Investigations Report (PDF) seems to show that very few records were exposed by data breaches in 2010. The report says that all of the breaches that Verizon investigated in 2010 only added up to about 3.9 million records that were exposed. That doesn't mean that only 3.9 million records were exposed in 2010. The Open Security Foundation's data breach database lists breaches in that year that exposed over 28 million records. So although the amount of data that was exposed through data breaches was lower in 2010 than it was in the previous few years,... Continue reading
Posted Jul 17, 2011 at Superconductor
In today's Forbes CIO Blog, Voltage co-founder, Matt Pauker, shares his vision for how corporations can reduce the risks associated with sensitive data being in the hands of 3rd party cloud/service providers - insist on a mandatory data encryption clause in all service provider contracts. Continue reading
Posted Apr 8, 2011 at Superconductor
As you will have read or watched in every media outlet today, Epsilon, a company that provides some of the top brand name companies with email marketing services had a data breach that uncovered the names and email addresses of millions of customers. These customers as reported in the New York Times and other blogs such as Byron Acohido's "The Last Watchdog", will now probably suffer from further attempts on their private information - Here's some resources that will help you make sense of the data breach and ensure that your company is not the next Epsilon: What do you... Continue reading
Posted Apr 4, 2011 at Superconductor
Interesting news article by industry reporter Rob Westervelt who has been following business and technology trends in the payments sector: PCI tokenization guidance could benefit payment processors By Robert Westervelt, News Editor 27 May 2010 | Continue reading
Posted May 27, 2010 at Superconductor
I've received lots of spam emails recently that tell me that I've been selected for inclusion in some sort of Who's Who book. As far as I can tell, all of these are scams designed to get you to give them your credit card number so that they can charge you for expensive books that you didn't order. On the other hand, maybe there's actually a good use for these scams. I have to wonder if being included in one of these books would help your chances for college admission these days. Imagine being able to add the following to... Continue reading
Posted May 20, 2010 at Superconductor
Hyperelliptic curves are interesting for many reasons. The reason that we’re particularly interested in them at Voltage is that you can implement pairings using them and it might turn out that pairings on hyperelliptic curves can be more efficient than pairings on elliptic curves. An elliptic curve is the set of points defined by an equation like y2 = x3 + ax + b This gives you a structure that’s much like a torus – a shape that has a single hole in it, like a doughnut. A hyperelliptic curve is defined by an equation like y2 = f(x) where... Continue reading
Posted May 19, 2010 at Superconductor
I received another one of those annoying spam emails from one of those operations that will include you in their exclusive Who's Who book because of your significant contributions to your field (i.e., having a valid email address). This particular spam, however, was apparently from "Satellite TV Quote." So it looks to me like some spammer couldn't quite keep his scams straight and included text from one scam in a message designed for another scam. Come on, spammers, at least make a reasonable effort to make your messages look legitimate. Continue reading
Posted May 18, 2010 at Superconductor
Getting privacy right is tricky. People say that they want lots of privacy, but their behavior often tells us that they really don't value their privacy that much. If you promise to email someone a weekly cartoon, for example, they'll often give you lots of personal information that they claim they want to keep private. The club cards that grocery stores are another example of this. The stores essentially pay you to let them track your purchases; they just pay you in discounts instead of cash. I was fairly surprised recently when I learned exactly how much stores pay you... Continue reading
Posted May 17, 2010 at Superconductor
According to the BBC, government officials in India have developed a new approach to outsourcing. This involves using prisoners in jails to run outsourced IT operations. The first projects planned to be run are actually the back-office systems for banks. I'm not entirely sure that's a good idea. Continue reading
Posted May 14, 2010 at Superconductor
Spam and the uncertainty that spam filters cause has dramatically reduced the effectiveness one of the most popular uses of the Internet. Maybe it’s time for a different approach to filtering email. Phones and email are both about equally useful: given the choice between giving up their phone of giving up email, people are about evenly divided. When comparing e-mail to other Internet technologies, however, it's no contest. Given the choice between giving up email and giving up browser-based web access, people cheerfully give forgo the web in favor of email. The web may be nice to have, but email... Continue reading
Posted May 13, 2010 at Superconductor
If you read papers about cryptography, you'll see the mathematical structure where integers are added modulo n written two different ways. Computer scientists tend to write this as Zn while mathematicians tend to write this as ℤ/nℤ. I've explained this so many times in the past year or so that I've decided to put an explanation here that I can just point people to in the future. The notation Zn is fairly easy to understand. It's just the set {0,1,…,n-1} along with addition modulo n. The notation ℤ/nℤ is a bit trickier. If we write the integers as ℤ where... Continue reading
Posted May 12, 2010 at Superconductor
As we've seen in previous posts, there's lots of structure in the available data on data breaches. In particular, the size of data breaches seems to follow a lognormal distribution as well as Benford's law. It looks like we can add a third law that this data follows, and that's Zipf's law. Suppose that we rank our data from largest to smallest. Zipf's law tells us that if we plot the log of the data versus the log of the rank we get a straight line. Zipf's law was first formulated based on the observation by linguist George Zipf that... Continue reading
Posted May 11, 2010 at Superconductor
After reading the recent post about the usability lessons that software vendors could learn from the MMORPG Progress Quest, an alert reader suggested another good candidate for a very usable product, and that's the Holly Hop Drive, as seen in the episode "Parallel Universe" of the TV Show Red Dwarf. Here's how the Holly Hop Drive is described in Red Dwarf: LISTER: (Holding up the Holly Hop Drive) Is this it? HOLLY: What do you think? LISTER: It’s just a box with “STOP” and “START” on it! HOLLY: It’s fairly straightforward. If you want to start it you press “START,”... Continue reading
Posted May 10, 2010 at Superconductor
Shamir's Third Law tells us that cryptography is always bypassed instead of beaten. Here's an example of why this is true. Suppose that you're a hacker who wants to sell credit card numbers on the black market, but all of the credit card numbers that you can get are encrypted with DES. Not Triple-DES, but the old, obsolete DES that only gives you 56 bits of strength. The same encryption algorithm that everyone dismisses as being way too weak to use. The most cost-effective way to crack DES is probably with a COPACOPBANA machine. One of these costs about $25,000... Continue reading
Posted May 7, 2010 at Superconductor