Similar Articles |
|
CIO October 1, 2003 Lorraine Cosgrove Ware |
By the Numbers It's not just what you send, it's what you store that needs encryption. |
PC World July 9, 2002 Lincoln Spector |
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. |
InternetNews July 9, 2009 Alex Goldman |
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. |
PC Magazine August 31, 2005 Ryan Naraine |
Privacy pioneer promises secure VoIP Phil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VoIP communications. |
InternetNews September 24, 2008 Paul Shread |
Can Storage Fabrics Offer Security? Security is becoming an increasingly important part of storage fabrics, judging by recent announcements from Cisco and Brocade. |
InternetNews April 2, 2007 Andy Patrizio |
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
Salon.com February 4, 2002 Barak Jolish |
The encrypted jihad We can't stop terrorists from using uncrackable codes. So we shouldn't even try... |
Salon.com March 27, 2002 Bill Lamb |
Pretty geeky privacy More and more people want powerful, easy-to-use encryption software, but the commercial world isn't providing it. Can open source deliver? |
InternetNews December 13, 2004 Sean Michael Kerner |
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. |
Macworld July 2000 Tom Negrino |
Protect Your e-Mail Keep Your Private Words from Prying Eyes |
Fast Company Steven Melendez |
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. |
PC Magazine September 21, 2005 Neil J. Rubenking |
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. |
InternetNews February 20, 2009 Jennifer Schiff |
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. |
InternetNews May 10, 2005 Michael Singer |
PGP: Extended Encryption For Compliance PGP Corporation's significant upgrade extends to an integrated suite of desktop and gateway security products. |
Information Today March 2006 Phillip Britt |
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. |
InternetNews September 12, 2006 Sean Michael Kerner |
IBM Encrypts The Key to Privacy IBM today officially announced new encryption technology and services that claim to provide "end-to-end" protection of customer data stored on IBM tape drives. |
InternetNews September 23, 2005 Sean Michael Kerner |
Credit Companies Tighten Encryption Equifax, Experian and TransUnion create a new standard to securing sensitive customer data. |
PC Magazine October 14, 2003 Leon Erlanger |
Hot-Spot Hazards Wireless hot spots are all the rage, but their lack of encryption means your sensitive information may be visible to anyone. Don't connect before following our suggestions. |
InternetNews November 16, 2006 Roy Mark |
Guidance Software Settles With FTC Guidance Software agreed Thursday to settle Federal Trade Commission charges that the computer forensics specialist did not take reasonable security measures to protect sensitive customer data. |
Information Today September 29, 2015 Abby Clobridge |
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. |
InternetNews February 13, 2007 Clint Boulton |
IBM Floats Encryption Downstream IBM's new TS3400 tape library borrows encryption technologies from the company's TS1120 tape drive. |
Bank Technology News November 2009 Rebecca Sausner |
The End of the World Heartland Payment System's CEO predicts 2010 will be the year that the payments chain becomes significantly more secure. |
Bank Systems & Technology June 1, 2004 George V. Hulme |
Ingrian Networks Helps Union Bank Protect Customer Data Better Vendor's DataSecure platform boosts bank's encryption capabilities and improves key management. |
InternetNews April 10, 2006 David Needle |
IBM's Answer to Security Blues IBM said it's developed technology that promises to bring mainframe-inspired levels of security to PCs, cell phones, PDAs and other digital devices. |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
InternetNews September 21, 2010 |
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. |
PC Magazine January 18, 2006 Craig Ellison |
Wireless Security Options GhostSurf provides encryption only for specific types of traffic, but SpotLock encrypts all types of traffic. |
JavaWorld August 2002 Ray Djajadinata |
Yes, you can secure your Web services documents, Part 1 This article discusses XML Encryption, an important technology in the Web services security realm. The article explains what it is, why savvy Java programmers should understand it, and how to implement the technology using IBM's XML Security Suite. |
CIO October 28, 2011 Nancy Gohring |
5 Things You Need to Know About Android Phones Android phones are in high demand by workers, but they lack key security features. Here are the top five things you can do to make sure Android phones in your organization don't create a security nightmare. |
National Defense August 2013 Jeffrey G. Richardson |
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. |
Entrepreneur September 2008 Heather Clancy |
Unscramble This Encrypting data can save you lots of heartache. how should you do it? |
PC World May 2001 Stan Miastkowski |
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... |
PC World September 12, 2001 Tom Spring & Frank Thorsberg |
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... |
BusinessWeek November 19, 2007 Stephen H. Wildstrom |
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. |
InternetNews October 28, 2008 Richard Adhikari |
Enterprises Still Lax on Storage Security Encrypting backup tapes is a good way to prevent data losses, but few companies do this correctly - or know where to store their encryption keys. |
PC World September 2005 Andrew Brandt |
PGP Desktop 9 Delivers a Sweet Security Suite Reasonably priced encryption software effectively guards your personal data. |
PC Magazine February 1, 2008 Eric Griffith |
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. |
Searcher August 2000 Josh Duberman & Michael Beaudet |
Privacy Perspectives for Online Searchers: Confidentiality with Confidence This article presents some of the issues and questions involved in online privacy from the information professional's perspective. We offer it as a resource for making more informed decisions in this rapidly changing area. |
InternetNews September 28, 2010 |
Microsoft Drops Patch for ASP.NET Zero Day Flaw Microsoft makes good on its promise to deliver an out-of-band patch for a zero day security exploit that had been shown capable of compromising server encryption. |
InternetNews May 25, 2004 Clint Boulton |
Microsoft Plans Security Perks for SQL Server 2005 The software giant adds encryption/decryption to its next-generation database and will put it through the government's security ringer. |
CIO July 1, 2002 Sarah D. Scalet |
Cheap, Cool and Dangerous A grassroots wireless LAN movement is rolling onto the networks of unsuspecting CIOs. It might already be too late to stop its spread, but it's not too late to make it secure. |
RootPrompt.org May 15, 2000 |
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... |
PC World March 2, 2001 |
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads... |
PC World March 7, 2001 Jennifer O'Neill |
FBI Battles Computer Crime 'Epidemic' Bureau works to balance tough stance with privacy rights, director says... |
Linux Journal April 1, 2007 Mike Halcrow |
eCryptfs: a Stacked Cryptographic Filesystem A new cryptographic filesystem in the Linux kernel uses stacking technology. |
Bank Technology News September 2009 Rebecca Sausner |
1) Heartland Payment Systems Heartland Payment System's E3, an end-to-(almost) end encryption process, has the greatest potential of any new product to impact the security of America's financial system in the coming year. |
InternetNews April 29, 2010 |
Symantec Picks Up PGP, GuardianEdge Acquisitions should help Symantec vendor raise its profile in the data encryption space, key technology used for sharing and storing information in the cloud. |
Information Today May 16, 2011 |
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. |
InternetNews November 17, 2010 |
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. |