Skip navigation

The Evolution of Security #2: Treasure Maps

Information security has, by necessity, changed a lot from a strategic perspective. From physical walls to encoded maps to locks and chains, the way we defend against the age-old criminal must evolve to support the ways we interact with data today.

Now, as we enter into an era of Security 3.0 that must grapple with new security challenges introduced by BYOD (Bring Your Own Device) and the cloud, what kind of security solution can we turn to in order to protect our private company data?

Stay tuned: The answer will be revealed April 14!

Duo’s Creative team has taken on the task of depicting security throughout the ages with a series of original illustrations. Here’s the second in our Evolution of Security series:

The Keys to the Gold Below

Evolution of Security: Treasure Maps

Pirates and thieves wisely sought the treasure map as the master keys to unlock an ancient fortune hidden deep underground or in remote caves - less obvious than a giant castle, and much more geographically obfuscated.

Armed with a treasure map, an explorer would have the keys to a chestful of gold - the location may be an X on the map, or coordinates indicating where to dig. Some treasure maps are puzzles, a series of encrypted messages that must be decoded for directions.

Buried treasure used to be protected by ambiguity and the earth...

Stay tuned to see the next phase of security evolution tomorrow!

Thu Pham

Information Security Journalist


Thu Pham covers current events in the tech industry with a focus on information security. Prior to joining Duo, Thu covered security and compliance for the infrastructure as a service (IaaS) industry at Online Tech. Based in Ann Arbor, Michigan, she earned her BS in Journalism from Central Michigan University.