• Embracing Tokenization: Payment Without Pain

    Posted October 26, 2009 - 2:49 pm

    According to the recent Gartner Group report, Using Tokenization to Reduce PCI compliance Requirements, "enterprises that have successfully implemented tokenization ... have reduced the scope of ... costly PCI compliance audits while keeping sensitive cardholder data more contained and secure."
  • U.S. Dept. of Education ties desktop encryption to employee ID cards

    Posted October 17, 2009 - 9:25 pm

    The Department of Education's desktop encryption rollout links the cryptographic process to employees' government-issued smart cards.
  • Could your mobile device land your CEO in court?

    Posted September 14, 2009 - 4:45 pm

    What happens if you don't encrypt the data on your portable device such as your smartphone or your laptop? What can possibly go wrong?
  • End-to-End Encryption: The PCI Security Holy Grail

    Posted September 10, 2009 - 3:45 pm

    Many of the data breaches of the past few years could have turned into non-incidents if the data had been encrypted.
  • Review

    Key management tools are key to enterprise encryption

    Posted September 10, 2009 - 10:45 am

    In response to dramatic and widely publicized losses of data over the last few years, IT execs are moving to deploy encryption in every corner of the enterprise. While encryption does reduce the chances of data loss, it can also create a management nightmare, with dozens of different encryption applications using hundreds or thousands of keys.
  • WPA Flawed, Not Broken

    Posted September 3, 2009 - 8:25 am

    Reading the headlines the past few days, you would think the world was ending. "WPA IS BROKEN," "JUST LIKE WEP," are a few of the headlines I've seen. Unfortunately, this is one whopper of media hype.
  • Confidental data for sale

    Posted June 30, 2009 - 10:07 am

    Isn't taking simple security precautions like encrypting confidential data a no-brainer?
  • So many passwords, so few hiding places

    Posted June 10, 2009 - 3:40 pm

    Maybe so, but the hiding places are getting so much better! Let's take a look at what technology hath wrought for solving this age old problem.
  • Security Analyst to DLP Vendors: Watch Your Language

    Posted June 8, 2009 - 9:35 am

    Data Loss Prevention (DLP) is all the rage in this era of data security breaches and increasingly clever malware attacks. Naturally, every vendor in the security market wants a piece of the action. But the term DLP "has essentially become meaningless because of a variety of vendors who wanted to say they were offering it," says Rich Mogull, former Gartner analyst and founder of security consultancy Securosis.
  • Sophos suite combines encryption, antimalware for Windows desktops

    Posted June 2, 2009 - 4:59 pm

    Sophos today unveiled a software suite for Windows desktops that combines full-disk encryption with antimalware, network-admission and port controls, and host-based intrusion protection.
  • Review

    Review: 3 email encryption packages help businesses stay secure

    Posted June 2, 2009 - 9:33 am

    This review, looks at three low-cost, easy-to-use email encryption packages: Hush Communications' Hushmail for Business, Voltage Security Inc.'s Voltage Secure Network and Connected Gateway and PGP Corp.'s Universal Server.
  • Latest Kaspersky mobile software wipes data via SMS

    Posted May 27, 2009 - 12:03 pm

    Kaspersky Lab's latest mobile security software due to be released next week can wipe data with a text message command even if a thief has swapped out the phone's SIM card.
  • Video

    Is it secure?

    Posted May 15, 2009 - 10:55 am

    An awkward question deserves a somewhat awkward answer. "Is it secure?". Its really all about residual risk calculation.
  • Post-breach, Heartland plans aggressive encryption project

    Posted May 6, 2009 - 8:13 pm

    After acknowledging in January that it suffered a data breach, Heartland today "is basically leading the way for the rest of the industry," says Gartner analyst Avivah Litan, noting that Heartland's plan for an end-to-end encryption system will be the first effort of its kind in the United States.
  • Vendors release password cracking, management tools

    Posted April 23, 2009 - 11:08 am

    As full-disk encryption becomes increasingly used, new software tools are being released that can recover lost passwords or change forgotten ones.
  • Cellcrypt secure VoIP heading to BlackBerry

    Posted April 16, 2009 - 9:03 pm

    Mobile voice encryption vendor Cellcrypt plans to offer BlackBerry software by the end of June.
  • Samsung, Dell provide data encryption for SSDs

    Posted April 16, 2009 - 5:22 pm

    Dell will offer self-encrypting Samsung SSDs with its Latitude line of laptops in the upcoming months.
  • Four Telecommuting Security Mistakes

    Posted March 30, 2009 - 11:30 am

    Whether it is employees who travel frequently for their job or staff that work out of a home office full or part-time, their mobility poses serious security risks to your organization. Here are four common mistakes employees make while telecommuting, and how to put a damper on them.
  • 8 Great Free Security Tools

    Posted March 24, 2009 - 10:48 am

    These eight free downloads and services will help you beat back the bad guys with antivirus and antispyware programs, personal firewalls, and even a program that can detect whether your Web site is under attack.
  • Users gain options for mobile voice encryption

    Posted March 6, 2009 - 11:07 am

    Mobile device security vendors rolled out an array of systems at Cebit for governments and companies looking to protect their voice calls.
  • Certgate unveils encryption SD cards for mobiles

    Posted March 4, 2009 - 10:56 am

    German company Certgate has released versions of an SD card that encrypts data on Windows Mobile 6.1 smartphones and e-mail on BlackBerry devices.
  • Sun offers open-source encryption key management protocol

    Posted February 17, 2009 - 5:13 pm

    Sun announced today that it is throwing its hat into the standards arena, proposing that its open-source key management API be used as a universal way to allow encrypting devices to communicate with key management systems.
  • HP, IBM push new OASIS encryption key standard

    Posted February 12, 2009 - 10:31 am

    A group of industry vendors, led by IBM, Hewlett-Packard and EMC, is proposing a new standard to make their encryption management software work together.
  • Coming soon: Full-disk encryption for all computer drives

    Posted January 28, 2009 - 5:15 pm

    The world's six largest computer drive makers Tuesday published the final specifications for a single, full-disk encryption standard that can be used across all hard disk drives, solid state drives (SSD) and encryption key management applications.
  • Unix tip: Inter-host trust on Unix, part 2

    Posted January 14, 2009 - 6:30 pm

    Ssh provides secure connection methods, but just how secure depends on how you use it. Let's take a look at some of its options and how it's different from rsh.
Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.


    Learn more

Join today!

See more content
Ask a Question