Technological advances are making adoption of network and data encryption more practical than ever, spurring its use in enterprises. Sixty-six percent of respondents to aPonemon Institute survey said ...
I once had the pleasure of visiting merry old London, England, attending the InfoSecurity Europe conference. About 12,000 people from all around the globe showed up for the 3-day affair and, as you ...
Policies, processes and a "corporate ethos" of care of data are more important in securing sensitive information than using encryption technology. Encryption has been back in the spotlight following ...
Last week I published two research reports on the hottest topic in PCI: Tokenization and Transaction Encryption. Part 1 was an introduction into the topic and Part 2 provided some action items for ...
Is your enterprise looking at increasing its use of data encryption? Check out these best practices before setting your enterprise strategy. In last week’s article, I covered four basic best practices ...
Let’s Encrypt, an organization set up to encourage broader use of encryption on the Web, has distributed 1 million free digital certificates in just three months. The digital certificates cover 2.5 ...
Mozilla versions, and the wrong one will fail with a mysterious and unhelpful error message. In Mozilla e-mail, choose Help > About Internet Suite and find the ...
Most of the attention on Windows 8.1 Preview emphasizes the many interface changes and new features. In the background, Windows 8.1 also offers a number of security enhancements that will help keep ...
Research into encryption technology is on the rise at universities and colleges, spurred on by technological advances, pressing security needs, and new legislation and regulations, asPart 1 of this ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results