SearchSecurity

New & Notable

News

(ISC)2 board chairman: 'We've definitely turned it around'

(ISC)2 Board Chairman Wim Remes, who is seeking re-election, details the organization's management changes and efforts to boost member engagement in this interview.

News

Regin malware: Why did it take so long to uncover?

Industry observers say the unveiling of the Regin malware, which came after more than half a decade in the wild, highlights the need for better detection methods.

Evaluate

The fundamentals of FDE: Procuring full-disk encryption software

Expert Karen Scarfone examines the most important criteria for evaluating full disk encryption options for deployment within an enterprise.

Evaluate

KeePass tutorial: Using the free password-management tool

Video: Learn how to use KeePass, the free password-management tool that can offer cash-strapped enterprises a way to help employees encrypt and secure their work-related passwords.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    PKI (public key infrastructure)

    A public key infrastructure (PKI) supports the distribution and identification of public encryption keys, enabling users and computers to both securely exchange data over networks such as the Internet and verify the identity of the other party.

  • Get Started

    Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.

  • Get Started

    encryption

    Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Sections from across SearchSecurity

  • News

    View All
  • Malware, Viruses, Trojans and Spyware

    How did the Regin malware go undiscovered for so long?

    Industry observers say the unveiling of the Regin malware, which came after more than half a decade in the wild, highlights the need for better detection methods.

  • Denial of Service (DoS) Attack Prevention

    DDoS attack sizes continue to grow as SSDP targeted

    New research shows that average DDoS attacks are growing larger and more prevalent as attackers have moved to exploit SSDP, the latest protocol to be abused for its amplification factor.

  • Disk Encryption and File Encryption

    Despite demand, Internet encryption has drawbacks

    News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close