Category: LuxSci Library: Security and Privacy

Can You Save Money by Spending on Security?

May 23, 2017

When everything is running smoothly, cyber security can go unnoticed by executives. It’s only when things go wrong that it tends to enter their peripherals. This often leads to inadequate budgeting or heavy cutbacks. Unfortunately, restricting security funds can result in incidents that cost companies many times more than what they would have spent on […]

What is really protected by SSL and TLS?

April 8, 2017

This question came in via Ask Erik: Hi Erik, I stumbled upon your blog while trying to learn a little about SSL/TLS in the context of client/server e-mail sessions, i.e. not web mail which I understand to be an HTTP session.  I am just an ordinary user with no special security needs but I find […]

Why Are Hackers Targeting Your Medical Records?

March 2, 2017

Theft of Medical records is booming. Over the past few years, large scale breaches have become more common and increasingly severe. Last year in June, a hacker named thedarkoverlord was selling 650,000 US healthcare records as part of a long-running crime spree. The collection was listed on a deep web marketplace called the Real Deal […]

Infographic – SSL vs TLS: What is the Difference?

October 9, 2015

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are foundations of security on the Internet.  However, between colloquial usage and the relationship between these security protocols, there is a lot of confusion regarding how they are related, how they are different, and what to use in what situation. For a detailed analysis of these […]

Next Generation Data Loss Prevention (DLP) with LuxSci Secure Email

September 29, 2015

Data Loss Prevention (DLP) describes a plan for companies to control the sending of sensitive data.  E.g. this can include controls to stop the flow of sensitive data or to ensure that sensitive data is always well-encrypted (for compliance) when sent. In the context of email, DLP is usually achieved through the following formula: Construct a […]