Email Alerts
-
Federal government pushes full disk encryption
Businesses need to follow the federal government's lead in reducing data breaches by holding employees responsible and examining full disk encryption (FDE) products. Column
-
Should log traffic be encrypted?
Should you be encrypting your security log transmissions? "It depends!" explains Mike Chapple in this SearchSecurity.com expert Q&A. Ask the Expert
-
Leveraging database security investments
Enterprises are now faced with the challenge of supporting multiple database versions on differing platforms, including SQL Server, Oracle Database, IBM DB2 and MySQL. While securing a diverse database architecture is crucial, the dollars needed to m... Tip
-
Hashing for fun and profit: Demystifying encryption for PCI DSS
These days there's no excuse for failing to encrypt sensitive data like credit card information, but the numerous types of cryptography, such as hashing, available can make implementation confusing. Learn how merchants are affected by the encryption ... Tip
-
When choosing a digital certificate, how important is the expiration period?
In this expert Q&A, application security pro Michael Cobb helps you plan your digital certificate policy. Cobb emphasizes the importance of keeping your Web server certificates up-to-date. Ask the Expert
-
Utimaco strives for ultimate mobile encryption
With new U.S. government initiatives to protect data, data encryption on mobile devices is becoming a must-have for many firms. As The 451 Group's Nick Selby writes, German vendor Utimaco Safeware is rapidly expanding its presence in the U.S. using a... Column
-
What are the best authentication tools for locking down a laptop?
Stolen laptops continue to be a troublesome issue for businesses. In this Identity Management and Access Control Ask the Expert Q&A, Joel Dubin reviews the best available authentication and encryption tools for securing company laptops. Ask the Expert
-
Laptop security essentials: Protecting device data, even from admins?
In this ITKnowledge Exchange thread, information security pros explain how to prevent unauthorized access, but question whether measures should be put in place to protect data from admins. Tip
-
Laptop crypto: Do it, but realize it's not a panacea
Laptop encryption has its pros and cons. Find out how to use laptop crypto to keep your sensitive data secure -- even if it falls in the hands of the enemy. Tip
-
Security Bytes: Symantec patches Veritas NetBackup PureDisk flaw
Meanwhile: Two MySQL database flaws are fixed, a study finds that many companies have lost laptops and the VA upgrades computer encryption after recent security breaches. Article
Security Management Strategies for the CIO