Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Which industries will experience the most data encryption challenges in 2014?
In this video, Richard Moulds, VP strategy with Thales e-Security, speaks with SC Magazine reporter Adam Greenberg on how encryption works and how to improve key management.
HP's Cyber Risk Report 2013 delved into encryption issues affecting data on mobile devices.
RSA has agreed with NIST's recommendation to stop using an encryption algorithm that may be compromised by a backdoor.
Released Tuesday, the update prevents exploit via "triple handshake" attacks, which could allow a bypass of encryption safeguards.
The best aspect of opportunistic encryption is in the fact that it can be built into our infrastructure and deployed transparently for everyone.
Microsoft plans to roll out new encryption and security measures in response to possible National Security Agency surveillance on the company.
In this month's debate, we received a number of responses to our debate topic this month, which covers the NSA's attempts to crack encryption methods.
So far, one solution, developed by European Payment Services, has been verified under PCI security standards for point-to-point encryption (P2PE) hardware.
Organizations vulnerable to the SSL/TLS encryption-breaking Heartbleed Bug, a critical vulnerability in widely used versions of the OpenSSL library, are updating quickly.
Still more revelations about National Security Agency (NSA) operations and practices that intrude on U.S. citizens' privacy and seemingly make a mockery of Constitutional rights have emerged, leaving both the general public and experts in the technology space reeling.
According to leaked documents, the NSA and its U.K. equivalent have used their expansive resources to undermine encryption methods widely used to secure internet communications.
Christopher Soghoian, of the ACLU (American Civil Liberties Union), concluded his speech at BSides San Francisco with the observation that developers building encryption models need to consider the US government a threat.
Tumblr users looking for extra blog protection can now opt for SSL security.
On Wednesday, Yahoo's CISO Alex Stamos announced the security measures.
Microsoft announced on Wednesday that it would be improving and expanding its security to protect customer data amid growing concerns of government surveillance.
A study from the California's attorney general closely examines recent breaches in a state whose notification law is now a decade old.
Devastating—that's the best way to describe the impact of not having a strong database security initiative. Did you know that 35% of all cyber attacks today occur without enterprises ever knowing that such an attack took place? It only takes 30 seconds to steal your data - making it humanely...
On Friday, the popular coupon site announced that hackers breached its servers.
While agility, availability and lower TCO will drive business to the cloud, organizations must address open questions around the security and compliance of PHI, PII, and who has access to it.