Email Alerts
-
Steganography techniques: MD5 implementation or RC4 encryption?
Although it is difficult to decipher encrypted data, steganography itself is relatively easy to detect. Expert Michael Cobb reviews which encryption algorithm is best to use when hiding important data. Ask the Expert
-
How to prevent operating system cloning with AES 256-bit encryption
Reading a binary image file and cloning a system can lead to serious data loss. Learn how to prevent this from happening with this advice from network security expert Mike Chapple. Ask the Expert
-
HHS HIPAA guidance on encryption requirements and data destruction
Complying with HIPAA is only becoming more challenging. Fortunately, the Department of Health and Human Services has recently released some preliminary guidelines on how to deal with HIPAA's encryption requirements and data destruction. Ask the Expert
-
Database monitoring, encryption vital in tight economy, Forrester says
A new report from Forrester Research Inc. examines eight database and server data security technologies and recommends small steps that can make a big difference. Article
-
Sophos integrates encryption into endpoint security
Sophos Endpoint Security and Data Protection is the first software to integrate encryption from its acquisition of Utimaco in 2008. News
-
Cryptography for the rest of us
In this video, learn cryptography techniques for your enterprise that comply with regulatory and legal requirements, as well as what you need to understand before buying or building cryptography solutions. Video
-
Data encryption best practices
Ever since Bank of America disclosed in 2005 that it lost a backup tape with customers’ personal data, nearly 80 other companies have reported similar embarrassing mishaps. These data breaches and new regulatory mandates are fueling the exploding int... E-Book
-
Encryption in data management should never be ignored, expert says
It isn't always convenient to encrypt sensitive data as part of an e-discovery process, but a data management expert at the Computer Forensics Show said its use is essential. Article
-
The difference between AES encryption and DES encryption
Choosing whether to encrypt your network data with the AES encryption algorithm or the DES encryption algorithm, is an important security matter. Learn which is the more secure option in this expert response. Ask the Expert
-
Security budget issues to resonate at RSA Conference
Increasing pressure to cut costs coupled with new compliance demands could have CISOs looking for answers at the 2009 RSA Conference. Article
Security Management Strategies for the CIO