Email Alerts
-
The difference between AES encryption and DES encryption
Choosing whether to encrypt your network data with the AES encryption algorithm or the DES encryption algorithm, is an important security matter. Learn which is the more secure option in this expert response. Ask the Expert
-
Security budget issues to resonate at RSA Conference
Increasing pressure to cut costs coupled with new compliance demands could have CISOs looking for answers at the 2009 RSA Conference. Article
-
Portable security storage device could replace OTP devices
A new USB-like device, hardened with security features, could overtake one-time password devices and give end users flash memory to carry around encrypted data. Article
-
Mass. officials explain new data protection regulations
In this podcast, Gerry Young and David Murray of the Massachusetts Office of Consumer Affairs and Business Regulation, discuss the details of the new data protection rules. News
-
A simple substitution cipher vs. one-time pad software
Both a simple subsitution cipher and one-time pad software have data encryption benefits despite their differences. Ask the Expert
-
Are encrypted, self-deleting USB storage drives worth the investment?
Expert Michael Cobb explains why some high-end, encrypted, self-deleting USB drives are worth looking into and may be a good investment. Ask the Expert
-
Massachusetts data protection, encryption law extended
Law now taking effect Jan. 1, 2010 would require any business collecting information on Massachusetts residents to encrypt sensitive data, protecting it from data leakage. Article
-
BlackBerry maker to acquire encryption firm
Research In Motion has won an ongoing battle with VeriSign Inc. to acquire encryption vendor Certicom Corp. for $105 million. Article
-
Encrypt now to meet new Mass. data protection law
A Massachusetts law taking effect in May requires encryption and could have organizations implementing the mandates across the board nationwide as the path of least resistance. Column
-
Should open source disk-encryption software be used?
When it comes to IT security, Michael Cobb recommends encryption devices or software that provide the most effective product for the threat being mitigated. Sound simple? See if that advice includes open-source tools. Ask the Expert
Security Management Strategies for the CIO