Data protection for humans. What are the basics (and how can you protect your data with stuff you already have)?

I recently had a conversation about data protection, specifically protecting the confidentiality and integrity of sensitive data.  Over the course of that conversation, realized that there is a LOT of confusion on the topic. How do we protect data? When does the data have to be protected? What constitutes protected?  Ultimately, we discovered that the […]

Vecrypt v1.19 released and fixes multiple low, medium and critical risk vulnerabilities

The open-source encryption software and successor to Truecrypt Veracrypt has been updated to v1.19 to address vulnerabilities discovered in a recently completed code audit. The update addresses all critical, medium and low-risk vulnerabilities and workarounds have been provided for those vulnerabilities not yet addressed.  The audit was completed against Veracrypt v1.18 and was completed on […]