Email Alerts
-
homomorphic encryption
Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form. Homomorphic encryptions allow complex mathematical operations to be performed on encrypted data without c... Definition
-
Cloud failures, privacy issues and data breach woes
Eric Holmquist of Holmquist Advisory joins the editorial team to talk about the Verizon DBIR, the recent Apple privacy debacle and the Amazon cloud failure. Podcast
-
Successful cloud migrations require careful planning
This month’s Information Security magazine online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new se... E-Zine
-
Database monitoring best practices: Using DAM tools
To effectively use DAM tools, admins must prioritize which transactions are important, learn how to collect events, and write and implement database security policies. Tip
-
Microsoft security chief stumps for Internet health check system
Microsoft Vice President of Trustworthy Computing Scott Charney at the RSA Conference 2011 discussed Collective Defense, Microsoft's proposed Internet health check system for consumer computers, and how it should be implemented not by governments and... Article
-
Emerging theme at RSA Conference 2011 may be 'mostly cloudy'
Security vendors at RSA Conference 2011 need to be more specific about the security technologies they are aiming at the cloud, industry analysts say. Article
-
Don't fight cloud computing technology, says Symantec's Thompson
Security professionals should embrace the inevitable shift to cloud computing, Symantec Chairman John Thompson says. Article
-
Privacy advocate explains why people should care about privacy
An all out assult on privacy is taking place and some people are failing to see the problem, said Tracy Ann Kosa, a privacy impact assessment specialist with the government of Ontario. News
Security Management Strategies for the CIO