From Built In Austin: Hackers, trackers and risks: 3 experts weigh safety for your startup

6:13 PM
From Built In Austin: Hackers, trackers and risks: 3 experts weigh safety for your startup -

Frog, AOS or Co-CTO Phil Molter was recently interviewed for an integrated Austin safety article for startups. Phil, AOS answers are below, and you can read the full article here

This article was published on Builtinaustin.com, and was written by Colin Morris.

With the mounting threat and the responsibility of security flaws in today, AOS technology landscape, no start can afford to run without a safety plan. And with the privacy, usability and regulation to take into account there, AOS no such thing as a one-size-fits approach.

With Cyber ​​Monday imminent, it, AOS more important than ever to have your command line.

We asked experts from three Austin technology companies focused on security and identity management is most important when you draw your company plan OSA. The Q & A below should help you to find the right questions to ask, constraints to consider and trends you need to know.

What are the safety standards are most important when building an online community?

When building an online community today, the most important standard is simply to encrypt all communication and data. This allows the protection of user privacy and security against eavesdropping. This makes the TLS (Transport Layer Security) protocol of the most important standard for network communication, and (Advanced Encryption Standard) encryption AES ciphers the most important standard for data encryption. Encryption doesn, AOT solve all security problems, but if you start giving, AOT with it, all your other efforts are compromised.

What are the most important questions a company should consider whether the decisions on the features and security guarantees to implement? How do you assess the risk?

Companies really need to ask how they can be compromised and what information can be obtained. Companies tend to focus on external threats, whether They active AORE as malicious hackers or passive like listening government. Companies can also easily be compromised by internal channels. Target, for example, has been compromised by an internal supplier. We call these attack vectors, and ask what they are and work to minimize is the key to safety.

What are the ways to balance security with convenience for users?

The misconception is that security and convenience are mutually exclusive. In fact, improving user convenience can actually improve security, because it is easier for them to protect themselves. Tools like Golden Frog VyprVPN OSA are more pervasive security because they make it more convenient. The best way to balance security with convenience is more convenient to make the security, not to sacrifice some security for convenience.

Tell us about the new technologies in this field. How will they affect safety?

Zero-knowledge protocols, which enable service providers to provide data transfer services without access to the data itself, are really coming to the forefront of the debate on privacy and security. messaging applications like Golden Frog, AOS CYPHER make use of it to provide individual and group conversations secure and private. Even Apple takes this technology to protect their iPads and iPhones latest. This technology and the mentality behind it pushes the security and control of the privacy of end users. People need to trust an intermediary to process their data safely.

Previous
Next Post »
0 Komentar