Disk Encryption and File Encryption
- June 12, 2015
News roundup: The call for ubiquitous HTTPS has grown stronger as of late; the White House and Apple are hoping to help push the movement. Plus: The cost of cybersecurity management to rise 38%; a 165% ransomware increase; gender salary gap closes?
- June 05, 2015
News roundup: New settings and options to boost user privacy and security are emerging on major websites, but is it enough?
- May 22, 2015
As privacy and security concerns rise, President Obama is urged to dismiss the call for government backdoors.
- February 10, 2015
HP has agreed to acquire encryption vendor Voltage Security. Gartner says the move will bolster HP's data protection and cloud security products.
- November 21, 2014
News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.
- July 02, 2014
Heartbleed exposed a number of long-standing issues at OpenSSL, but the open source encryption project has laid out plans to improve the organization.
- June 10, 2014
CryptoLocker's infrastructure may be down for now, but experts say the easy money that can be made from ransomware means it is here to stay.
- May 30, 2014
For enterprises, the sudden shuttering of the disk-encryption utility TrueCrypt highlights the risk of using open source security tools.
- April 10, 2014
Video: Cryptography Research Inc. president Paul Kocher details how the ongoing NSA encryption-cracking scandal affects trusted crypto algorithms.
- April 01, 2014
Awkward? The NIST Cybersecurity Framework arrives as the U.S. government struggles to counter negative reports on its data privacy and encryption standards.
- February 25, 2014
In his 2014 RSA Conference keynote, Art Coviello downplayed RSA's relationship with NSA, inferring different NSA groups cause perception problems.
- February 05, 2014
With Microsoft's MD5 deprecation set for next week, experts say companies must be careful to avoid other weak protocols, like SHA-1.
- January 10, 2014
Executive Editor Eric B. Parizo explains why the 2014 RSA Conference boycott, like the MLB Hall of Fame voting, is driven by a crisis of conscience.
- December 18, 2013
CloudFlare hopes its open-sourced Red October server encryption software, based on the 'two-man rule,' can help thwart rogue insiders and secure Web.
- October 30, 2013
The PCI SSC says hardware-based point-to-point encryption (P2PE) will better secure merchant card data and make PCI DSS compliance easier.