Ed Adams

Ed Adams
Ed Adams is a software quality and security expert with over 20 years of experience in the field. He served as a member of the Security Innovation Board of Directors since its inception in 2002 and took over as CEO in 2003. Ed is Research Fellow at The Ponemon Institute, serves on the board of several IT security organizations, and was named a Privacy by Design Ambassador by the Information and Privacy Commissioner of Canada.
Find me on:

Recent Posts

IT security spend is on the rise; however, damaging attacks and data breaches are more common than ever. Part of the reason for this is the imbalance of spend and mindshare – many organizations allocate higher budget to...

DNS service provider Dyn was attacked several times on Friday via a DDoS (distributed denial of service) – hackers basically flooded their systems with so much traffic that nothing could get through. This impacted Dyn...

Happy 25th birthday to the world wide web! It's difficult to imagine the first public website was launched just 25 years ago in 1991. For most people, it's hard to think about our lives without the internet.

Internet use...

Application security is often overlooked, under-funded, or ignored. Part of the reason for this is because it can be a complex, difficult aspect of IT security…but mostly it's because it's simply misunderstood.

When I...

Hackers Ruined My Wife's Valentine's Day!

by Ed Adams on February 15, 2016 at 3:02 PM

I had an interesting experience when ordering a gift for my wife online at a popular personalized gift store. We love drinking wine, so my plan was to inscribe a set of 6 wine glasses. Like many couples that haven’t hit...

It’s difficult to imagine a life without technology. Without our phones, tablets, and laptops it’d be more difficult to stay connected with friends and family, and less convenient to research and shop for items we want to...

There are a million reasons why technology can lead to a data security breach. I could sit here and write about all of them (and publish a novel as opposed to a blog), or I could just focus on the #1 factor in data security...

Today, many financial services organizations are using mobile apps to amp up customer service and efficiency. These same apps, though, are probably a security problem waiting to happen. Fortunately, smart development teams...

Researchers Predict “Cryptopolypse”

by Ed Adams on November 26, 2013 at 8:33 AM

It's Already Here, Folks...

At the 2013 Black Hat conference, researchers declared that the math for cracking encryption algorithms could soon become so efficient that it will render the RSA crypto algorithm obsolete.  This,...

There has been a lot written on the disruptive technology shifts to mobile and cloud platforms and the security challenges each bring; however, in the shuffle, a stalwart staple of Enterprise IT (and emerging threats to it)...