SafeNet

Home » Inside SafeNet » Key Management

Over the weekend, a disgruntled former employee of NextEra Energy Resources, a subsidiary of Florida Power & Light, claimed he discovered a vulnerability in the Cisco security management software, and was able to hack into... read more »

When regulatory compliance dictates, specific industries proactively plan for protection. The plan 'bleeds' into other data (PCI into PII for example). When I spend time with industries that 'straddle' the... read more »

In recent weeks, we have seen several attacks occur against organizations that have been renowned for security. It is not that these organizations were unsecure; rather it is that the face of the security playing field is... read more »

Have you tried to take a bottle of water through airport security? Not as simple as it used to be. It was the unsuccessful transatlantic plot that caused this extra security limitation. While the plot itself didn’t... read more »

For years now, journalists, analysts, vendors, and pretty much everyone else in the tech industry have been singing the praises of the cloud, touting such benefits as cost savings, enhanced service levels, unprecedented agility,... read more »

The U.K.-based Sky News just released an investigative report uncovering an electricity key scam, netting criminals millions of pounds. Based on their report, 125,000 people purchased illegal “top-ups” for their meters from... read more »

By Stephen Helm, Product Marketing, HSM The streets of Baltimore City taught me a harsh lesson last week. As I prepared to begin my commute to the SafeNet office in Belcamp, I discovered the contents of my glove box had been... read more »

News flash -- the Cloud is coming. This is not news for anyone who attended the RSA Conference in San Francisco last week, where security firms of all shapes and sizes were on hand to discuss their solutions for cloud... read more »

In a recent article published in Healthcare Information and Security, SafeNet's Derek Tumulak spoke with the editor regarding a recent consumer survey conducted in North America. The survey found that only 50% of Americans... read more »

In the recent post, “Ember Needs A Wake-Up Call From The CIA,” the author, Jeffery Carr, exposes the security vulnerabilities of the wireless communication protocol ZigBee that is commonly used in semiconductor chips found in... read more »

Cloud