Email Alerts
-
Xerox developing new document encryption technology
Xerox's intelligent redaction software would enable users to selectively encrypt different portions of a document for different recipients. Article
-
Seagate pushes hard drive encryption to the data center
Seagate wants to extend full disk encryption to hardware, but is the enterprise ready? Article
-
McAfee acquires SafeBoot for endpoint encryption
McAfee is acquiring endpoint encryption vendor SafeBoot Corp. in a $350 million deal to bolster the antivirus vendor's mobile device security software. Article
-
Is encrypting cookies a PCI DSS requirement?
Security management expert Mike Rothman discusses whether or not storing sensitive information in the form of a cookie is considered a violation of PCI DSS. Ask the Expert
-
How should sensitive customer data, such as driver's license information, be handled?
In this Q&A, Identity management and access control expert Joel Dubin discusses how to properly protect the personal data of a driver's license. Ask the Expert
-
What are the best laptop data encryption options?
When it comes to protecting laptops and hard drives, there are plenty of choices. In this expert Q&A, Michael Cobb lays out some data protection options. And they're not just software-based, either. Ask the Expert
-
Encryption strategies for preventing laptop data leaks
The majority of enterprise notebook computers contain sensitive information. Should those devices fall into the wrong hands, encryption can keep the data safe. Expert Lisa Phifer discusses the pros and cons of today's notebook data encryption methods... Tip
-
Compliance, data breaches heighten database security needs
Experts say database platforms lack robust native encryption, monitoring, assessment and management tools to meet demanding new security requirements. Article
-
PCI Data Security Standard compliance: Setting the record straight
Helping executives understand what PCI Data Security Standard compliance is all about can be a challenge, especially when it comes to debunking the many myths that have been perpetuated over the years. Read this tip by contributor John Kindervag as h... Tip
-
Considerations for encryption and compliance
It's often thought that a wide-ranging encryption implementation can prevent data loss and satisfy compliance mandates. Reality, of course, is more complex. Contributor Trent Henry discusses the pros and cons of various encryption strategies, as well... Tip
Security Management Strategies for the CIO