Email Alerts
-
Security channel can't ignore full-disk encryption products, services
Full-disk encryption products and services present a huge opportunity for solution providers. The products, which were once considered "nice to have," are now a necessity for many companies. Learn how this market has evolved, as well as how you can h... Article
-
Vulnerabilities, regulatory compliance drive data protection market
While compliance along with risk and vulnerability management are the two headings under which security spending often falls, the ultimate goals of both is data protection. Experts explain the "serious business" that is data protection. Article
-
Steganography techniques: MD5 implementation or RC4 encryption?
Although it is difficult to decipher encrypted data, steganography itself is relatively easy to detect. Expert Michael Cobb reviews which encryption algorithm is best to use when hiding important data. Ask the Expert
-
How to prevent operating system cloning with AES 256-bit encryption
Reading a binary image file and cloning a system can lead to serious data loss. Learn how to prevent this from happening with this advice from network security expert Mike Chapple. Ask the Expert
-
HHS HIPAA guidance on encryption requirements and data destruction
Complying with HIPAA is only becoming more challenging. Fortunately, the Department of Health and Human Services has recently released some preliminary guidelines on how to deal with HIPAA's encryption requirements and data destruction. Ask the Expert
-
Database monitoring, encryption vital in tight economy, Forrester says
A new report from Forrester Research Inc. examines eight database and server data security technologies and recommends small steps that can make a big difference. Article
-
Sophos integrates encryption into endpoint security
Sophos Endpoint Security and Data Protection is the first software to integrate encryption from its acquisition of Utimaco in 2008. News
-
Cryptography for the rest of us
In this video, learn cryptography techniques for your enterprise that comply with regulatory and legal requirements, as well as what you need to understand before buying or building cryptography solutions. Video
-
Data encryption best practices
Ever since Bank of America disclosed in 2005 that it lost a backup tape with customers’ personal data, nearly 80 other companies have reported similar embarrassing mishaps. These data breaches and new regulatory mandates are fueling the exploding int... E-Book
-
Encryption in data management should never be ignored, expert says
It isn't always convenient to encrypt sensitive data as part of an e-discovery process, but a data management expert at the Computer Forensics Show said its use is essential. Article
Security Management Strategies for the CIO