Full disk encryption is the most commonly used encryption strategy in practice today for data at rest, but does that mean it’s sufficient to prevent unauthorized access to your data? The short answer: ...
Dell on Wednesday launched Dell Data Protection Encryption software. Targeted to SMBs and enterprise customers, Dell claims it provides flexible, manageable and auditable endpoint encryption while ...
While Safer Internet Day was on Tuesday, Google has turned the event into a week-long affair of new features and tools. Today, it is focusing on Android with Adiantum to bring encryption to ...
NEW YORK, NY--(Marketwire - December 09, 2008) - SkyRecon(r) Systems (www.skyrecon.com), the premier provider of integrated, proactive endpoint security solutions, today announced that it is set to ...
Like with any industry, the information security industry, more commonly referred to as “cybersecurity,” for all its raging debates, has rallied around a small corpus of best practices. One of the ...
Vormetric, a provider of enterprise system encryption solutions, plans to announce tomorrow Vormetric Data Security for Amazon EC2, which enables organizations to remotely apply and manage transparent ...
Users are storing more sensitive data in flash memory on their mobile applications such as digital cameras, smart phones and tablets. Because of this reason, the Joint Electron Device Engineering ...
If you’ve been paying attention lately, you’ve likely noticed that more of your everyday websites are going HTTPS by default: Twitter, Facebook, LinkedIn, and even your favorite search engine. This is ...
If you sync files on your PC to cloud storage, you're probably aware of the privacy risks involved. Services like Google Drive and OneDrive have access to everything you upload unless you encrypt it ...
In my blog “The Importance of Memory Encryption for Protecting Data in Use,” I discussed the growing industry consensus on the imperative of incorporating memory encryption in computing architectures.