MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
PC Magazine
August 31, 2005
Ryan Naraine
Privacy pioneer promises secure VoIP Phil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VoIP communications. mark for My Articles similar articles
InternetNews
September 24, 2008
Paul Shread
Can Storage Fabrics Offer Security? Security is becoming an increasingly important part of storage fabrics, judging by recent announcements from Cisco and Brocade. mark for My Articles similar articles
InternetNews
April 2, 2007
Andy Patrizio
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
Salon.com
February 4, 2002
Barak Jolish
The encrypted jihad We can't stop terrorists from using uncrackable codes. So we shouldn't even try... mark for My Articles similar articles
Salon.com
March 27, 2002
Bill Lamb
Pretty geeky privacy More and more people want powerful, easy-to-use encryption software, but the commercial world isn't providing it. Can open source deliver? mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
Macworld
July 2000
Tom Negrino
Protect Your e-Mail Keep Your Private Words from Prying Eyes mark for My Articles similar articles
Fast Company
Steven Melendez
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. mark for My Articles similar articles
PC Magazine
September 21, 2005
Neil J. Rubenking
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
InternetNews
May 10, 2005
Michael Singer
PGP: Extended Encryption For Compliance PGP Corporation's significant upgrade extends to an integrated suite of desktop and gateway security products. mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
InternetNews
September 12, 2006
Sean Michael Kerner
IBM Encrypts The Key to Privacy IBM today officially announced new encryption technology and services that claim to provide "end-to-end" protection of customer data stored on IBM tape drives. mark for My Articles similar articles
InternetNews
September 23, 2005
Sean Michael Kerner
Credit Companies Tighten Encryption Equifax, Experian and TransUnion create a new standard to securing sensitive customer data. mark for My Articles similar articles
PC Magazine
October 14, 2003
Leon Erlanger
Hot-Spot Hazards Wireless hot spots are all the rage, but their lack of encryption means your sensitive information may be visible to anyone. Don't connect before following our suggestions. mark for My Articles similar articles
InternetNews
November 16, 2006
Roy Mark
Guidance Software Settles With FTC Guidance Software agreed Thursday to settle Federal Trade Commission charges that the computer forensics specialist did not take reasonable security measures to protect sensitive customer data. mark for My Articles similar articles
Information Today
September 29, 2015
Abby Clobridge
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. mark for My Articles similar articles
InternetNews
February 13, 2007
Clint Boulton
IBM Floats Encryption Downstream IBM's new TS3400 tape library borrows encryption technologies from the company's TS1120 tape drive. mark for My Articles similar articles
Bank Technology News
November 2009
Rebecca Sausner
The End of the World Heartland Payment System's CEO predicts 2010 will be the year that the payments chain becomes significantly more secure. mark for My Articles similar articles
Bank Systems & Technology
June 1, 2004
George V. Hulme
Ingrian Networks Helps Union Bank Protect Customer Data Better Vendor's DataSecure platform boosts bank's encryption capabilities and improves key management. mark for My Articles similar articles
InternetNews
April 10, 2006
David Needle
IBM's Answer to Security Blues IBM said it's developed technology that promises to bring mainframe-inspired levels of security to PCs, cell phones, PDAs and other digital devices. mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
InternetNews
September 21, 2010
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. mark for My Articles similar articles
PC Magazine
January 18, 2006
Craig Ellison
Wireless Security Options GhostSurf provides encryption only for specific types of traffic, but SpotLock encrypts all types of traffic. mark for My Articles similar articles
JavaWorld
August 2002
Ray Djajadinata
Yes, you can secure your Web services documents, Part 1 This article discusses XML Encryption, an important technology in the Web services security realm. The article explains what it is, why savvy Java programmers should understand it, and how to implement the technology using IBM's XML Security Suite. mark for My Articles similar articles
CIO
October 28, 2011
Nancy Gohring
5 Things You Need to Know About Android Phones Android phones are in high demand by workers, but they lack key security features. Here are the top five things you can do to make sure Android phones in your organization don't create a security nightmare. mark for My Articles similar articles
National Defense
August 2013
Jeffrey G. Richardson
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
PC World
May 2001
Stan Miastkowski
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... mark for My Articles similar articles
PC World
September 12, 2001
Tom Spring & Frank Thorsberg
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... mark for My Articles similar articles
BusinessWeek
November 19, 2007
Stephen H. Wildstrom
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. mark for My Articles similar articles
InternetNews
October 28, 2008
Richard Adhikari
Enterprises Still Lax on Storage Security Encrypting backup tapes is a good way to prevent data losses, but few companies do this correctly - or know where to store their encryption keys. mark for My Articles similar articles
PC World
September 2005
Andrew Brandt
PGP Desktop 9 Delivers a Sweet Security Suite Reasonably priced encryption software effectively guards your personal data. mark for My Articles similar articles
PC Magazine
February 1, 2008
Eric Griffith
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. mark for My Articles similar articles
Searcher
August 2000
Josh Duberman & Michael Beaudet
Privacy Perspectives for Online Searchers: Confidentiality with Confidence This article presents some of the issues and questions involved in online privacy from the information professional's perspective. We offer it as a resource for making more informed decisions in this rapidly changing area. mark for My Articles similar articles
InternetNews
September 28, 2010
Microsoft Drops Patch for ASP.NET Zero Day Flaw Microsoft makes good on its promise to deliver an out-of-band patch for a zero day security exploit that had been shown capable of compromising server encryption. mark for My Articles similar articles
InternetNews
May 25, 2004
Clint Boulton
Microsoft Plans Security Perks for SQL Server 2005 The software giant adds encryption/decryption to its next-generation database and will put it through the government's security ringer. mark for My Articles similar articles
CIO
July 1, 2002
Sarah D. Scalet
Cheap, Cool and Dangerous A grassroots wireless LAN movement is rolling onto the networks of unsuspecting CIOs. It might already be too late to stop its spread, but it's not too late to make it secure. mark for My Articles similar articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
PC World
March 2, 2001
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads... mark for My Articles similar articles
PC World
March 7, 2001
Jennifer O'Neill
FBI Battles Computer Crime 'Epidemic' Bureau works to balance tough stance with privacy rights, director says... mark for My Articles similar articles
Linux Journal
April 1, 2007
Mike Halcrow
eCryptfs: a Stacked Cryptographic Filesystem A new cryptographic filesystem in the Linux kernel uses stacking technology. mark for My Articles similar articles
Bank Technology News
September 2009
Rebecca Sausner
1) Heartland Payment Systems Heartland Payment System's E3, an end-to-(almost) end encryption process, has the greatest potential of any new product to impact the security of America's financial system in the coming year. mark for My Articles similar articles
InternetNews
April 29, 2010
Symantec Picks Up PGP, GuardianEdge Acquisitions should help Symantec vendor raise its profile in the data encryption space, key technology used for sharing and storing information in the cloud. mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
InternetNews
November 17, 2010
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. mark for My Articles similar articles