VIRTUAL SWEATER VEST
Encryption Works Great, But Only When Done Right
Security Pros Failing to Inspect Encrypted Traffic
What the CIA WikiLeaks dump tells us: Encryption works
ESET – What is encryption and how does it work?
IoT Crypto Key Reuse Soars 40%
Sweet validation: Apple versus FBI
Encryption bill draft muddled, imposing
HTTPS Everywhere: Encryption for All WordPress.com Sites
Will White House, currently mulling bill, remain mum on encryption?
The Apple v. FBI Showdown – additional info
Apple Contests Court Order to Create iOS Backdoor for San Bernardino Investigation
House Bill Could Block State, Local Bills that Seek to Undermine Mobile Encryption
NY Bill Would Force Decryption of Smartphones On Demand
Google to Warn Recipients of Unencrypted Gmail Messages
New Android Marshmallow devices must have default encryption, Google says
Krebs – How Not to Start an Encryption Company
White House Calls For Encryption By Default On Federal Websites By Late 2016
3 Lessons From Heartland Breach The Second Time Around
Practical IT: What is encryption and how can I use it to protect my corporate data?
LogJam: Researchers Identify Another Web Encryption Vulnerability