Chelsea Manning Doesn’t Regret Military Leak in ‘Vogue’ Chat …

Chelsea Manning looks empowered and free in a new feature for the September issue of Vogue and she sounds it too.

The former military specialist, who was released from prison in May following a commuted sentence, told the fashion magazinethat despite the controversy surrounding her decision to leak more than 700,000 classified government documents via WikiLeaks, she does not regret doing so.

"I've accepted responsibility for my own decisions and my own actions," she said, noting that her decision to leak the information was aligned with her own moral code. "I think it's important to remember that when somebody sees government wrongdoing whether it's illegal or immoral or unethical there isn't the means available to do something about it. Everyone keeps saying, You should have gone through the proper channels! But the proper channels don't work."

Manning further explained that she had technically tried to get the information out through the mainstream press, but ultimately opted to go through WikiLeaks after getting nervous about her short window of opportunity to release the information.

"I did this all on leave. I had only twelve days," she said of a period in early 2010 when she attempted to reach out toThe Washington Post andThe New York Times. "I ran out of time."

Manning was tried and convicted in 2013 and came out as transgender the day after she was sentenced to 35 years in prison, a declaration that made her an activist icon for many.

In looking back at her life back then, Manning told Vogue that one of her regrets was not seeking support from her aunt and sister in the days prior to her enlistment in the army, when she was living with her aunt in suburban Maryland, even though she knew something felt off.

"That's the part of my life I replay the most: whether or not, living in Maryland and seeing a therapist, I could have finally been able to say, 'This is who I am; this is what I want to do,'" she said. "It was the first time in my life when I really considered transitioning. But I got scared. I really regret the fact that I didn't know or realize I already had the love I needed, especially from my aunt and sister just to seek support."

Since leaving prison, Manning has been busy writing her memoir about her experiences, and is the subject of both a documentary in the works and an art project based on her DNA.

The installation, titled "Probably Chelsea," consists of a futuristic collaboration between Manning and artist Heather Dewey-Hagborg, who used swabs of Manning's DNA to create 30 mask-like faces via 3D portraits. Manning mailed cheek swabs and hair clippings to Dewey-Hagborg while she was behind bars, starting in 2015, and the artist extracted DNA information from the samples to generate possible portraits of her friend.

Sign up for our newsletter to receive breaking news directly in your inbox.

The rest is here:
Chelsea Manning Doesn't Regret Military Leak in 'Vogue' Chat ...

Manning doesn’t look glamorous in Vogue shoot; and that’s great – WatertownDailyTimes.com

There is a single thing worth noticing about the photo shoot of Chelsea Manning, this eras second most infamous transgender woman, in the September issue of Vogue. She is not glamorous.

Mannings cropped strawberry blonde hair is windswept and wet, and other than what appears to be a bit of mascara and perhaps some lip balm, there is little evidence of makeup. The styling, by Phyllis Posnick, is all about looking natural and relaxed or as much as one can while being attended to by a village of fashion editors and assistants. The backdrop is a nearly empty, rocky beach with foamy waves in the distance on a fairly overcast day. An empty lifeguards chair sits off to the side. There is nothing particularly sophisticated or chic about the setting or the styling. This is not one of those white-sand beaches dotted with elegant cabanas and oiled-up bar boys standing at the ready.

Instead, this is Everymans beach - a place for day trips, not summering.

This is Mannings fashion coming out in the pages of a magazine that transforms fashion into popular culture, politics into iconography, controversy into high gloss. She is the former Fort Drum soldier previously known as Bradley Manning. However one might view Manning as a whistle-blower or a traitor the message of this photo is accessibility, normalcy, calm.

This is a far cry from the haughty, hyper-feminine Hollywood unveiling of Caitlyn Jenner on the cover of Vanity Fair in 2015. Jenners long chestnut hair was done up in flowing waves. Inside, there were more pictures featuring perfect makeup, a glittering gold evening gown, retro ivory lingerie, contoured cleavage and legs stretched long like Marlene Dietrich. Everything about Jenners photographs, from the cover to the inside pages, declared, loudly and emphatically: I am the visual epitome of a woman, from the top of my perfect blow-out to my stiletto heels.

Manning is not so insistent that her femininity, her womanliness, is consistent with such narrow standards. Perhaps its because she is younger than Jenner by almost 40 years a millennial rather than a baby boomer. Perhaps its because the culture has shifted in the past two years. (And with a single presidential tweet, continues to shift.) Perhaps its simply because Manning and Jenner are two very different people, and blessedly, that is reflected in how they are photographed, even though both were shot by Annie Leibovitz.

In Vogue, Manning wears a red Norma Kamali one-piece swimsuit. With its sweetheart neckline and wide straps, it has a retro aesthetic. And had Manning been styled differently, with smoky eye makeup and tousled hair, it would have been the perfect costume for a pin-up. Instead, the suit, with its tummy concealing ruching along the sides, is more reassuring than sexy. As swimwear goes, its not especially revealing. Its conservative. Its purpose isnt to flaunt the body so much as it is to flatter it.

The accompanying story by Nathan Heller is filled with detailed descriptions of the various ensembles Manning wears as Heller accompanies her to a literary party and engages her in a conversation on the banks of the Hudson River. The list of designer wear is long and impressive: Altuzarra, Marc Jacobs, the Row, Vetements.

Manning notes that she has a lot of fashion news to catch up on, thanks to her detention at Fort Leavenworth military prison. She has been a fast study and is particularly enamored of collections that blur gender lines, that do not aspire to create perfection but that revel in the off-beat the off-kilter. When she posted an image of herself on Instagram after leaving prison, her bright red lips stood out against her cropped hair and simple black dress. The picture was controlled but inviting. She looked like she was headed to the office, not declaring her personal freedom. Although sometimes, freedom can simply mean the sweet ability to just be boring.

Manning isnt on the cover of Vogue. Jennifer Lawrence stars in four different versions of the September issue, which celebrates the magazines 125th anniversary. And she gets the full Vogue fantasy gloss, dressed up as everything from a screen siren to (sort of) a 19th-century debutante. Manning isnt even a head-turner. She doesnt startle you by how pretty she looks. She is so pale against the washed out sky and the sand. The swimsuit pops into focus before she does. Manning is looking directly at the camera and smiling. She doesnt look relaxed. (Perhaps only a professional celebrity could fully exhale in the bullseye of Leibovitzs lens.) But Manning definitely looks pleased.

Read more from the original source:
Manning doesn't look glamorous in Vogue shoot; and that's great - WatertownDailyTimes.com

Rep. Dana Rohrabacher meets with WikiLeaks founder Julian Assange: Report – Washington Examiner

Rep. Dana Rohrabacher, R-Calif., had a meeting Wednesday with WikiLeaks founder Julian Assange in London at the Ecuadorian Embassy, according to a report on Wednesday.

Charles Johnson, a conservative journalist who joined Rohrabacher and Assange, said the meeting was originally arranged because Assange wants to find an agreement with the U.S. and not live in asylum anymore. Assange has lived in asylum in the Ecuadorian Embassy since August 2012.

Rohrabacher's spokesman Ken Grubbs confirmed to the Daily Caller he was present on the meeting as well.

The Justice Department has expressed interest in pressing charges against Assange for assisting Edward Snowden, a former NSA analyst, to release classified documents, the Washington Post reported in April. Snowden was granted asylum by Russia.

Last month, Rohrabacher admitted he had previously met with a prosecutor from Moscow to discuss information regarding a Russian fraud case that precluded Congress passing the Magnitsky Act, which imposed U.S. sanctions on Russia regarding human rights abuses.

"I had a meeting with some people, government officials, and they were saying, Would you be willing to accept material on the Magnitsky case from the prosecutors in Moscow? And I said, Sure, I'd be willing to look at it,'" Rohrabacher told The Hill.

Rohrbacher said he disclosed the information he received from the prosecutor with members of the House Foreign Affairs Committee and the U.S. Treasury Department.

Read more:
Rep. Dana Rohrabacher meets with WikiLeaks founder Julian Assange: Report - Washington Examiner

Martin Shkreli thinks he’ll be president someday – Salon

Do you think Martin Shkreli, aka the Pharma Bro, is destined to become an American president?

If you dont, he certainly does.

Well, at some point Ill be POTUS, Shkreli wroteon his Facebook page ina post published Tuesday. He addedthat conservative commentator Ben Shapiro wouldbe his vice president and alt-right pundit Milo Yiannopoulos wouldbe his press secretary, before going on to list some more unorthodox choices:

Kanye West will be head of the CIA. Stefan Molyneux will be Secretary of State. Kodak Black will be Attorney General. Edward Snowden would be the head of the NSA. Julian Assange: FBI. Kim Kardashian is Fed Chairwoman. Trashy is Surgeon General.

From there, Shkreli predicted defeating a ticket with President Mark Zuckerberg and Vice President Bernie Sanders no earlier than 2024, since he also predicted theyd have to abolish Zuckerbergs Universal Basic Income which passed in 2024.

Shkreli addedthat Young Turks host Cenk Uygar will be sent back to wherever he came from and that Lauren Duca will tragically fall ill from subtweeting too hard if she isnt the First Lady.

Somewhat more ominously, Shkreli also boasted that he would put nuclear weapons in enemies cities, force members of the media to go through training programs and completely slash almost all entitlement programs.

An account purportedly belonging to Yiannopoulos has already liked the status update and said that Im down, while Shkreli added in the comments that OKAY FINE KIM KARDASHIAN WILL BE HEAD OF THE FEDERAL RESERVE.

Whereas President Donald Trump at least had a core of support prior to his career as a politician, Shkreli may now bebest known for raising the price of a life-saving drug by 5000 percent and being convicted of three counts of securities fraud.

Visit link:
Martin Shkreli thinks he'll be president someday - Salon

The Laws of Mathematics and the Laws of Nations: The Encryption Debate Revisited – Lawfare (blog)

Australia is weighing in on the encryption debate regarding exceptional access by law enforcement. As George Brandis, the Australian Attorney-General, described last month, the Prime Ministers office advocates requiring internet companies and device makers [to follow] essentially the same obligations that apply under the existing law to enable provision of assistance to law enforcement and to the intelligence agencies, where it is necessary to deal with issues: with terrorism, with serious organized crime, with paedophile networks and so on. He further asserted that the chief cryptographer at GCHQ, the Government Communication Headquarters in the United Kingdom had assured him that this was feasible.

The Prime Minister of Australia, Malcolm Turnbull, subsequently entered into an interesting interchange with a reporter. When asked by Mark DiStefano, a reporter from ZDNET, Wont the laws of mathematics trump the laws of Australia? And then arent you also forcing people onto decentralized systems as a result? The Prime Minister of Australia said the laws of Australia prevail in Australia, I can assure you of that. The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia."

This interchange provides a good opportunity to explore where the laws of mathematics and the laws of nations hold sway. DiStefanos comment about the laws of mathematics is a reference to the conclusion offered by many technically informed parties that including a capability for exceptional access into any encryption scheme invariably reduces the security afforded by that scheme.

But this conclusion is not what the Attorney-General was referring to; he spoke only of an obligation of vendors to provide assistance to law enforcement and intelligence agencies (presumably to provide clear text when required by law). It is certainly possible to develop a system that enables vendors to meet this requirement, and a system with this capability must be that which the chief cryptographer at GCHQ asserts is feasible. This system will not be as secure as it would be without this requirement, though it will enable certain law enforcement and intelligence activities to take place that would not otherwise be possible.

So once again, we see that participants in this debate are not arguing about the same thing. The anti-exceptional access community is talking about the impossibility of developing a system with exceptional access capability that affords the same security as one without such a capability. The pro-exceptional access community is talking about the feasibility of a system with exceptional access capabilities that provides the best security possible given that requirement. And both communities are correct.

Whether the tradeoff is worthwhilelesser security for all in exchange for better ability to pursue certain law enforcement and intelligence activitiesis clearly a policy and legal decision for the Australian government. Of course, to have a reasonable debate about this question, the Australian government would have to acknowledge the first part of this tradeofflesser security for alland whether or not it is willing to do so is not yet clear.

Turnbulls statement is absurd on its face. A more astute response would have been to acknowledge that human laws must be consistent with the laws of mathematics but then to say that the laws of mathematics do not prevent compliance with a requirement such as the one proposed by the Attorney-General. But the Prime Minister would also have had to acknowledge the above-mentioned trade-off explicitlyand maybe such an acknowledgment would have been politically inconvenient.

As I have writtenbefore, these comments also apply precisely to the corresponding debate in the United States. To make progress on either side of the Pacific Ocean, it would help if both sides were talking about the same thing.

More:
The Laws of Mathematics and the Laws of Nations: The Encryption Debate Revisited - Lawfare (blog)

eperi Presents Secure Cloud Data Encryption at it-sa 2017 – BW Businessworld

eperi , a provider of cloud data protection solutions, will be presenting its eperi Gateway at this year's it-sa (10-12 October 2017 in Nuremberg, stand 10.1-430).

At the stand, Elmar Eperiesi-Beck, founder and CEO of eperi, Holger Mnius, Sales director DACH and System Engineer, Stefan Mark, will inform the audience about data encryption and what it means for the General Data Protection Regulation (GDPR), which will come into force in May 2018.

They will also demonstrate the eperi Gateway and show how it can be used to reduce the scope of GDPR to effectively meet compliance requirements.

By October 2017, companies will only have eight months to prepare their business for the GDPR requirements, said Elmar Eperiesi-Beck. The clock is ticking and organisations that continue to process personal data on EU citizens without the necessary security could face six to seven-digit penalties in the next year. They have to be able to prove at all times that they comply with the data protection requirements.

The eperi Gateway provides transparent, fast and effective encryption of data at rest, in use and in transit, without affecting the functionalities of the protected applications, databases or file storages. It helps solve the data protection problem by ensuring only authorised users have access to the data in plain text.

Outside the secure environment of the company, the information is encrypted. This reduces the impact GDPR has on a company and minimises the scope of the regulation since the information is unreadable to unauthorised outsiders; for example, if the data is processed in the cloud.

The GDPR requirements for centralised control and Security by Design are also met because the eperi Gateway enables enterprises to manage their cryptographic keys completely internally and maintain full control of their data - even in decentralised cloud environments.

Organisations that encrypt personal data reduce the risk of data theft, continued Eperiesi-Beck. Attackers cannot use the encrypted data without the cryptographic keys.

Moreover, Article 32 of the GDPR also mandates that safety solutions should be regularly checked. The eperi Gateway fulfils this requirement by using transparent, Open- Source encryption that can be checked at any time for weaknesses. Importantly, the eperi Gateway was jointly developed with the German Federal Office for Security in Information Technology (BSI).

See original here:
eperi Presents Secure Cloud Data Encryption at it-sa 2017 - BW Businessworld

End-to-end encryption isn’t enough security for ‘real people’ – The Conversation US

The weak spots are at the ends.

Government officials continue to seek technology companies help fighting terrorism and crime. But the most commonly proposed solution would severely limit regular peoples ability to communicate securely online. And it ignores the fact that governments have other ways to keep an electronic eye on targets of investigations.

In June, government intelligence officials from the Five Eyes Alliance nations held a meeting in Ottawa, Canada, to talk about how to convince tech companies to thwart the encryption of terrorist messaging. In July, Australian Prime Minister Malcolm Turnbull called on technology companies to voluntarily ban all systems that totally encrypt messages in transit from sender to recipient, an approach known as end-to-end encryption. British Home Secretary Amber Rudd made global headlines with her July 31 newspaper opinion piece arguing that real people dont need end-to-end encryption.

These claims completely ignore the one billion real people who already use secure messaging apps like Signal and WhatsApp. And it leaves no room for people who may decide they want that security in the future. Yet some technology companies look like they might be considering removing end-to-end encryption and others installed backdoors for government access years ago. Its been two decades since the Clipper chip was in the news, but now a revival of the government-business-consumer crypto-wars of the 1990s threatens.

One thing is very clear to computer scientists like me: We real people should work on improving security where we are most vulnerable on our own devices.

For the moment at least, we do have good, easy-to-use solutions for secure communication between computers, including end-to-end encryption of our messages. End-to-end encryption means that a message is encrypted by the sender, and decrypted by the recipient, and no third party is able to decrypt the message.

End-to-end is important, but security experts have warned for years that the most vulnerable place for your data is not during transit from place to place, but rather when its stored or displayed at one end or the other on a screen, on a disk, in memory or on some device in the cloud.

As the WikiLeaks release of CIA hacking tools highlighted, if someone can gain control of a device, they can read the messages without needing to decrypt them. And compromising endpoints both smartphones and personal computers is getting easier all the time.

Why are we most vulnerable at the endpoint? Because we dont like to be inconvenienced, and because adding more protection makes our devices harder to use, the same way putting multiple locks on a door makes it harder to get in, for both the homeowner and the burglar. Inventing new ways to protect our digital endpoints without reducing their usefulness is very challenging, but some new technologies just over the horizon might help.

Suppose a criminal organization or bad government, EvilRegime, wants to spy on you and everyone you communicate with. To protect yourself, youve installed an end-to-end encryption tool, such as Signal, for messaging. This makes eavesdropping even with a courts permission that much more difficult for EvilRegime.

But what if EvilRegime tricks you into installing spyware on your device? For example, they could swap out a legitimate upgrade of your favorite game, ClashBirds, with a compromised version. Or, EvilRegime could use a malware network investigative technique as a backdoor into your machine. With control of your endpoint, EvilRegime can read your messages as you type them, even before they are encrypted.

To guard against either type of EvilRegimes trickery, we need to improve our endpoint security game in a few key ways, making sure that:

In addition, it would be ideal if users could control their apps security themselves, rather than having to rely on app store security provided by yet another vulnerable corporation.

Computer security experts are excited about the idea that blockchain technology might be able to help us secure our own endpoints. Blockchain, the technology that underpins Bitcoin and other cryptocurrencies, creates a verifiable, unchangeable public record of information.

What this means for endpoint security is that computer scientists might be able to create blockchain-based tools to help us verify the origin of our apps. We could also use blockchains to confirm our data havent been tampered with, and to ensure our privacy. And as long as the source code for these programs is also free for us to inspect as Signal is today the security community will be able to verify that there are no secret backdoors.

As with any new technology, there is an enormous amount of hype and misinformation around blockchain and what it can do. It will take time to sift through all these ideas and develop secure tools that are easy to use. In the meantime, we all need to continue to use end-to-end encryption apps whenever possible. We should also stay vigilant about password hygiene and about what apps we install on our machines. Finally, we must demand that real people always have access to the best security mechanisms available, so we can decide for ourselves how and when to resist surveillance.

More:
End-to-end encryption isn't enough security for 'real people' - The Conversation US

Here’s Why We Need More Open Source Software For Buttplugs – Motherboard


Motherboard
Here's Why We Need More Open Source Software For Buttplugs
Motherboard
Internet-connected sex toys have been on the market for a while now, but the software that operates these very personal devices remains mostly closed, meaning it's not shared with users in a way that allows them to tinker with it. In practice this ...

and more »

Read the rest here:
Here's Why We Need More Open Source Software For Buttplugs - Motherboard

Safety, Security & Open Source in the Automotive Industry – TechSpective

Todays cars are as much defined by the power of their software as the power of their engines. Almost any car feature you can name is now digitized to provide drivers with easier operation and better information. Technological innovation is accelerating, enabling automobiles to monitor and adjust their position on the highway, alerting drivers if theyre drifting out of their lane, even automatically slowing down when they get too close to another car.

More and more vehicles are connected, equipped with Internet access, often combined with a wireless local area network to share that access with other devices inside as well as outside the vehicle. And whether were ready or not, well soon be sharing the roads with autonomous vehicles.

Driving the technology revolution in the automotive industry is software, and that software is built on a core of open source. Open source use is pervasive across every industry vertical, including the automotive industry. When it comes to software, every auto manufacturer wants to spend less time on what are becoming commodities such as the core operating system and components connecting the various pieces together and focus on features that will differentiate their brand. The open source model supports that objective by expediting every aspect of agile product development.

But just as lean manufacturing and ISO-9000 practices brought greater agility and quality to the automotive industry, visibility and control over open source will be essential to maintaining the security of automotive software applications.

When you put new technology into cars, you ran run into security challenges. For example:

Vehicle manufacturers need to adopt a cybersecurity approach that addresses not only obvious exposures in their cars software, but also the hidden vulnerabilities that could be introduced by open source components in that software.

As auto OEMs work with software providers, a growing set of open source components is making its way into automobile systems. Open source code is being channeled through countless supply chains in almost every part of the automotive ecosystem.

When a supplier or auto OEM is not aware all the open source in use in its products software, it cant defend against attacks targeting vulnerabilities in those open source components. Any organization leveraging connected car technology will need to examine the software eco-system it is using to deliver those features, and account for open source identification and management in its security program.

To make progress in defending against open source security threats and compliance risks, both auto OEMS and their suppliers must adopt open source management practices that:

FULLY INVENTORY OPEN SOURCE SOFTWARE: Organizations cannot defend against threats that they do not know exist. A full and accurate inventory (bill of materials) of the open source used in their applications is essential.

MAP OPEN SOURCE TO KNOWN SECURITY VULNERABILITIES: Public sources, such as the National Vulnerability Database provide information on publicly disclosed vulnerabilities in open source software. Organizations need to reference these sources to identify which of the open source components they use are vulnerable.

IDENTIFY LICENSE AND QUALITY RISKS: Failure to comply with open source licenses can put organizations at significant risk of litigation and compromise of IP. Likewise, use of out-of-date or poor quality components degrades the quality of applications that use them. These risks also need to be tracked and managed.

ENFORCE OPEN SOURCE RISK POLICIES: Many organizations lack even basic documentation and enforcement of open source policies that would help them mitigate risks. Manual policy reviews are a minimum requirement, but as software development becomes more automated so too must management of open source policies.

ALERT ON NEW SECURITY THREATS: With more than 3,500 new open source vulnerabilities discovered every year, the job of tracking and monitoring vulnerabilities does not end when applications leave development. Organizations need to continuously monitor for new threats as long as their applications remain in service.

As open source use continues to increase in the auto industry, effective management of open source security and license compliance risk is becoming increasingly important. By integrating risk management processes and automated solutions into their software supply chain, automakers, suppliers, and technology companies servicing the automotive industry can maximize the benefits of open source while effectively managing their risks.

View original post here:
Safety, Security & Open Source in the Automotive Industry - TechSpective

The Power of Pervasive Encryption – Security Intelligence (blog)

The new z14 mainframe computer offers a chance to re-evaluate what a mainframe can do for an organization. Gone are the days when the mainframe was the only way to do computing. Today, there are new and different choices, and the z14 can make those choices practical.

The z14 features standard improvements that users have come to expect, such as faster, more efficient hardware chips. It also includes a pervasive encryption scheme that may prove to be as important as anything that was done to the computing hardware.

Transitioning away from selective encryption toward end-to-end protection will help organizations secure enterprise data while reducing the cost and complexity of meeting emerging compliance mandates. It is a far more general approach that applies to data in transit and at rest. This routine and pervasive use of cryptography is performed all the time to all data, except that which is immediately processed inside the mainframe.

The details of the new cryptography system start with the z14s new coprocessor, the Central Processor Assist for Cryptographic Function (CPACF). This high-performance, low-latency coprocessor performs symmetric key encoding and calculates message digests (hashes) in hardware. It is standard on every core, directly supports cryptography and offers hardware acceleration for all encryption operations that occur on the core processor.

According to IBM Systems Magazine, a Solitaire Interglobal report found that this cryptographic acceleration provides six times more performance than the previous z13 model. Additionally, z14 is more than 18 times faster than competing platforms.

The CPACF also has extended key and hash sizes used in the Advanced Encryption Standard (AES) and Secure Hash Algorithm (SHA), as well as support for UTF8-to-UTF16 conversion. The cryptography hardware is available to all processor types used in the z14.

Bulk file and dataset cryptographic operations were specifically placed within the mainframes operating system software to maximize transparency to the running files and optimize performance. This is a critical point: All the potential benefits of pervasive encryption are lost if a required intermediary step interferes with getting the work done. With the z14, users can transition DB2 and information management system (IMS) high-availability databases from unencrypted to encrypted without stopping the database or the application.

The ability to seamlessly encrypt is a big deal to users. The data used by an application or database is protected, but no user changes are required. Additionally, this means service-level agreements can be maintained.

Both the financial and data processing businesses need this kind of encryption in all places due to the rush of new regulatory compliance mandates that will soon affect them. Additionally, cloud-based data stored in x86 boxes are encrypted at the source and protected at rest. A business using a z14 platform does not have to depend on the low-throughput encryption of such cloud solutions. Data stored in these boxes will already be in an acceptable state without the need for further processing.

No other platform can do this. And it took both advanced hardware and software to pull this off, not just one or the other.

Even with the mainframe doing all it can to keep things secure, bad policy decisions by the user can undercut everything. Users need to maintain security policies and enforce them not count on the machine alone to wave a magic encryption wand to keep data safe.

The z14 is a unique and effective tool to help organizations achieve their security goals. However, the mainframe cannot do this alone: It needs informed and committed users to maximize its effectiveness.

Read the white paper: Pervasive Encryption, The New Paradigm for Protection

The rest is here:
The Power of Pervasive Encryption - Security Intelligence (blog)