• 11 reasons encryption is (almost) dead

    Posted May 5, 2014 - 11:29 am

    Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever
  • Security Manager's Journal: When technologies collide

    Posted January 14, 2013 - 1:22 pm

    An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
  • iPads storm the enterprise

    Posted February 14, 2011 - 12:40 pm

    As global accounts director at Altus, Inc., Michelle Klatt's job is to visit Fortune 500 companies and demonstrate her firm's video management software. When the iPad came out a year ago, she was all over it.
  • End-to-End Encryption: The PCI Security Holy Grail

    Posted September 10, 2009 - 3:45 pm

    Many of the data breaches of the past few years could have turned into non-incidents if the data had been encrypted.
  • Security Analyst to DLP Vendors: Watch Your Language

    Posted June 8, 2009 - 9:35 am

    Data Loss Prevention (DLP) is all the rage in this era of data security breaches and increasingly clever malware attacks. Naturally, every vendor in the security market wants a piece of the action. But the term DLP "has essentially become meaningless because of a variety of vendors who wanted to say they were offering it," says Rich Mogull, former Gartner analyst and founder of security consultancy Securosis.
  • Four Telecommuting Security Mistakes

    Posted March 30, 2009 - 11:30 am

    Whether it is employees who travel frequently for their job or staff that work out of a home office full or part-time, their mobility poses serious security risks to your organization. Here are four common mistakes employees make while telecommuting, and how to put a damper on them.
  • Clock ticking for gas stations to pump up data security

    Posted January 8, 2009 - 11:13 am

    Lower gas prices aren't the only thing that's new at the pumps these days. Data encryption tools are also becoming part of the picture.
  • What can you afford NOT to do on IT security?

    Posted December 22, 2008 - 3:43 pm

    The ever-expanding list of external and internal threats make it hard to devote less money to security efforts. But there are areas in which IT and security managers may be able ease up on spending.
  • Amateurs and pros vie to build new crypto standard

    Posted November 7, 2008 - 9:37 pm

    A contest, sponsored by the National Institute of Standards and Technology (NIST), hopes to find a new cryptographic hash algorithm to replace the SHA-2 (Secure Hash Algorithm - 2) algorithm that NIST published eight years ago. The deadline for SHA-3 submissions was Oct. 31, and NIST hopes to cut the field down to 15 or 20 contestants by next August. That's when the hard work of hammering away at the submissions and knocking loose any flaws will really begin.
  • I’ve Got a Secret - Key, That Is

    Posted November 4, 2008 - 8:52 am

    How many of you use VPN?
  • Why technology isn't the answer to better security

    Posted October 20, 2008 - 10:55 am

    In this, CIO's sixth year of conducting the "Global State of Information Security" survey with PricewaterhouseCoopers, they got an earful about the challenges, worries and wins in security technology, process and personnel.
Join us:






Join today!

See more content
Ask a Question