Email Alerts
-
What are the risks of turning off pre-boot authentication?
In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin discusses the dangers associated with turning off pre-boot authentication (PBA)? Ask the Expert
-
Will the PCI DSS require encryption over dedicated lines?
Currently, the PCI Data Security Standard mandates the encryption of any wireless transmissions, but should security professionals be ready to encrypt transmissions over dedicated lines? In this expert Q&A, expert Mike Chapple reveals which PCI chang... Ask the Expert
-
Richard Clarke: Don't ignore data risks, deploy encryption
At a recent keynote with CISOs during the Gartner IT Security Summit, former White House cybersecurity czar Richard Clarke warned that firms are doing little to prevent data theft. Article
-
Are encryption products better than self-destructing data?
Although spy vs. spy shows may have made lost data deletion technologies a fun gimmick, information security threat expert Ed Skoudis explains the data protection problems that may arise when a tape "will destruct in five seconds." Ask the Expert
-
network encryption (network layer or network level encryption)
Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level. Definition
-
Escrowed Encryption Standard (EES)
The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.S. Department of Commerce in 1994 and is better known by the name of an implementation called the Clipper chip. Definition
-
Encrypting File System (EFS)
The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent. Definition
-
data key
In cryptography, a data key is a key (a variable value that is applied to a string or block of text to encrypt or decrypt it) that is used to encrypt or decrypt data only and is not used to encrypt or decrypt other keys, as some encryption formulas c... Definition
-
Rijndael
Rijndael (pronounced rain-dahl) is the algorithm that has been selected by the U.S. National Institute of Standards and Technology (NIST) as the candidate for the Advanced Encryption Standard (AES). Definition
-
Database authentication, encryption getting priority in some businesses
While more organizations are seeking database authentication and encryption technologies, others are turning to database monitoring to secure data. Article
Security Management Strategies for the CIO