article thumbnail

FAQ: Can I destroy a paper original after scanning?

The Texas Record

Both local governments and state agencies want to know if they ‘go paperless’ — if they digitize their essential records — can they get rid of the original paper or film copies? Local Government Rules. Ours is not the only government agency tasked with setting rules that affect records management.

Paper 98
article thumbnail

The Security Vulnerabilities of Message Interoperability

Schneier on Security

How will the networks manage keys, authenticate users, and moderate content? In our latest paper, One Protocol to Rule Them All? Interoperability will vastly increase the attack surface at every level in the stack ­ from the cryptography up through usability to commercial incentives and the opportunities for government interference.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Analysis of Threema

Schneier on Security

As one example, we present a cross-protocol attack which breaks authentication in Threema and which exploits the lack of proper key separation between different sub-protocols. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers.

Security 120
article thumbnail

Can two-factor authentication save us from our inability to create good passwords?

IT Governance

Perhaps it’s time we finally push for the widespread adoption of two-factor authentication. What is two-factor authentication? This may sound complicated, but anyone with a bank card has been using two-factor authentication for years. Authentication factor examples. Why you should use two-factor authentication.

article thumbnail

UK FCA Consults on Changes to Strong Consumer Authentication, Dedicated Interfaces, and Guidance on Payment Services

Data Matters

On January 28, 2021, the UK Financial Conduct Authority (FCA) published Consultation Paper CP21/3 , “Changes to the SCA-RTS and to the guidance in ‘Payment Services and Electronic Money – Our Approach’ and the Perimeter Guidance Manual” (Consultation Paper). its Perimeter Guidance Manual (PERG). Transaction risk analysis.

article thumbnail

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

And PKI , of course, is the behind-the-scenes authentication and encryption framework on which the Internet is built. PKI is the framework by which digital certificates get issued to authenticate the identity of users; and it is also the plumbing for encrypting data moving across the Internet. Achieving high assurance.

article thumbnail

Transition to Electronic Government: Signs of the Time

Preservica

In 2002, I accepted the position of Statewide Records and Forms Coordinator for the Wisconsin Department of Electronic Government (DEG). Today, digital information and communications technologies are ubiquitous in the public sector and every agency is engaged in e-government. Playing Catch Up.