Updated: 2010-03-18 18:43:41
As I mentioned in an earlier post, the 2010 RSA Conference Keynote addresses have been posted online and I’m linking some of my favorites from the 2010 conference. You can view an interactive webcast, view the video, or even listen/download audio-only podcasts of the keynote presentations. It is often hard to follow the keynotes in [...]
Updated: 2010-03-03 17:45:02
As you may already know, I’m attending the 2010 RSA Conference in San Francisco, CA. I’ve been spending so much time talking with vendors, going to keynote talks and going to track sessions I haven’t had much time to finish writing and editing any full blog posts yet. Rather than rush to publish, I want [...]
Updated: 2010-02-24 03:14:20
Message Authentication Codes (MACs) are special pieces of data used to prove the authenticity and integrity of a message– to show that the message originated from a certain source and that it has not been modified. Consider a scenario in which Alice wants to send Bob an email. Upon receiving the email, Bob would like [...]