• March 19, 2015

    The Next Cybersecurity Target: Medical Data

    As we've learned from recent reports, hackers often carry out massive cyber attacks to gain access to financial data through banks and retail companies, but this week's breach hit a seemingly new target: medical data, taken from the health insurance company Premera Blue Cross. The attack affected 11 million patients, making it the largest cyber attack involving medical information to date. "Advanced cybersecurity defenses are still a relatively new idea to many healthcare organizations," said Greg Kazmierczak, the CTO of data-security company Wave Systems Corp.


  • March 18, 2015

    Nice and Easy Does it: ‘Back to Basics’ Hacking Methodologies

    Highlighted in a pull quote saying, “We are seeing fewer ‘full frontal’ attacks, and more that seek a credible side door,” Wave’s Boudewijn Kiljan weighs in on the need for cybersecurity professionals to do more to tackle basic threats. Quoted several times throughout the article, Boudewijn touches on different hacking methods that are sometimes overlooked by firms when employing IT security strategies.


  • March 11, 2015

    Security Experts Rap Clinton’s Email Practices

    “Security could have influenced Hillary Clinton's decision to create a personal email channel for herself while Secretary of State, but she probably had less reason to worry about security than the rank-and-file members of her agency,” said Wave Systems President and CEO, Bill Solms. “It would likely have been a much more highly protected account than those at State that were recently compromised by hackers."


  • March 10, 2015

    5 Tools for Improved Identity Management

    In their search for insight from industry thought leaders, Government Computer News recently sought out Wave Systems regarding the demands surrounding mobile security credentials in the government marketplace. Representing Wave and speaking to our VSC solution, CTO Greg Kazmierczak was quoted in this piece saying, “Wave System’s Virtual Smart Card (VSC) is intended to replace the need for passwords or external tokens such as physical smart cards by using the Trusted Platform Module (TPM).


  • March 9, 2015

    The Morning Risk Report: Hillary Clinton’s Email-Risk Lessons for CEOs

    The controversy over Hillary Clinton’s use of a personal email account for official business should resonate in C-suites and boardrooms, where similar practices and their attendant risks are not uncommon.  An individual executive making a decision to create a private communication capability to avoid inspection or to avoid the discovery of a possible smoking gun is one concern, but what is equally if not more troubling is the realization that personal accounts are often more vulnerable to hacks than a given federal account. Bill Solms, President and CEO of Wave Systems Corp.


  • March 6, 2015

    Feedback Friday: Industry Reactions to Hillary Clinton’s Use of Personal Email

    News broke last week that Hillary Clinton exclusively used a personal email account to conduct official government business during her tenure as U.S. Secretary of State. What is coming to light is that Clinton may have violated federal regulations, which require officials to conduct day-to-day operations on authorized information systems that have a proper level of security controls. The use of a personal email account might have left Clinton’s communications vulnerable to hacker attacks.


  • February 24, 2015

    SSD Management Made Easy

    As Greg Kazmierczak, the Chief Technical Officer of Wave Systems tells us, “Wave provides IT managers with a complete data protection solution for their organization’s SEDs, all from a single remote console—either on-premise or in the cloud.  Wave EMBASSY® Remote Administration Server (ERAS) and Wave Cloud solutions were specifically tailored to manage superior encryption options such as SEDs fro


  • February 4, 2015

    Three Adware-Infected Android Apps Suspended From Google Play

    Wave Systems CTO Greg Kazmierczak comments on recent reports that three popular apps in the Google Play Android app store were infecting users with adware. Though Google is said to be scanning for potential risks, there are multiple challenges in properly identifying all potential situations. “Google has been doing a better job of scanning for malicious apps, but in all reality, it can be difficult to prove that malicious code is even in an app at all,” said Kazmierczak.


  • January 30, 2015

    Don't Be Next: How to Stop the Next Hack Attack

    Fresh Business Thinking, an online UK-based publication geared towards business owners, directors and entrepreneurs, recently picked up an article crafted by Wave's Boudewijn Kiljan who offers his take on how best to secure a company's assets in a modern workforce environment that is essentially borderless.  


  • January 19, 2015

    Bold Reform Needed to Strengthen Our Cybersecurity

    In the hours leading up to President Obama’s State of the Union address, Bill Solms takes a firm stance on the state of cybersecurity in our nation. Leading off the article in a pseudo letter to the President, Bill clearly states his position, saying “Mr. President, the status quo in cybersecurity is failing this country.


  • December 18, 2014

    Securing edge devices and data in distributed industrial applications

    In the last few months there has been a resurgence of interest in the internet of things, suggesting that the era for building distributed big data industrial applications has at last dawned. Power companies are working hard to build the smart grid by melding IT technology with electricity services. Oil companies are integrating their machinery into digital oil fields. Photovoltaic technology is being developed as a consumer product, to integrate with the smart grid centralised solar farms, and distributed residential solar stations.


  • December 8, 2014

    Cybersecurity Blind Spots: What Aspiring Experts Need to Know

    As cautious as some people are about their web browsing habits, they throw that caution to the wind when it comes to managing their passwords. This was apparent in a survey of some 1,000 Internet users performed for ComputerTrainingSchools.com by Op4G.


  • November 17, 2014

    U.S. State Department is Latest Hacking Victim

    Over the course of the last several weeks, a number of high-profile U.S. federal networks have been breached by attackers. The latest organization to be breached is the U.S. State Department, which had to take its email system offline. The breach at the State Department follows attacks against the White House, the United States Postal Service (USPS) and the National Oceanic and Atmospheric Administration (NOAA).


  • November 14, 2014

    A Modern Approach to Authentication – The Virtual Smart Card

    Highlighting the ongoing challenges of CEOs and CIOs to minimize the onslaught of cyber attacks against enterprises, Girish speaks to the need to not only “support” strong authentication, but to also understand the strength and the context of the solutions, as well as the industry standards that apply. Girish offers the Wave Virtual Smart Card as a solution – pointing to its ease of use and its ability to lower total cost of ownership by upwards of 50 percent.



  • November 14, 2014

    Self-Encrypting Drives

    Wave's EMBASSY® Remote Administration Server was recently mentioned by name in a CSO Online article about self-encrypting drives. “SEDs are becoming more popular as businesses realize the importance of security data at rest,” states the article. It appears as though, once again, Wave was ahead of its time. According to the author, the key selling point for SEDs isn't just that they encrypt data, but that it's carried out in the firmware of the drive.