Email Alerts
-
encryption
Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. Definition
-
Credant helps IT shops secure mobile technology
Product review: Though some features need work, Mobile Guardian Enterprise Edition 5.1 achieves its main mission of protecting confidential data on portable devices. Article
-
Password-protecting removable media devices
Safeguard your removable devices. Learn if any products can password-protect the entire device without requiring that the individual connections are encrypted, in this identity management and access control Q&A. Ask the Expert
-
Secure email exchange: Establishing security associations
What happens if a security association can not be established during an email exchange? Michael Cobb has the answer. Answer
-
Crypto panel takes on RFID, bashed hash functions
The lively exchange between some of security's biggest names in the business this year included a wake-up call to update older designs and devise a new hash function standard as well as watch out for RFID tags. Article
-
Security Bytes: Cisco adds to its patch pile
Flaws in IOS and CallManager could be exploited to escalate administrative privileges and cause a denial of service. Meanwhile, exploit code targets Veritas NetBackup. Article
-
block cipher
A block cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time. Definition
-
Quiz: Storage security
Regulations like SOX and the recently approved Personal Data Privacy and Security Act are bringing the importance of data protection to light. Loss of data – be it inadvertent or surreptitious -- can result in fines, loss of revenue and loss of... Security Quiz
-
Flaws reported in Trend Micro ServerProtect
Storage and security managers should be wary of vulnerabilities in the AV product that could enable a denial-of-service and malicious code execution. Workarounds are available. Article
-
The 5 A's of functional SAN security
This tip examines why admins should follow the 5 A's of SAN security: Authentication, access, audits, alarms and availability, to keep their SAN secure. Tip
Security Management Strategies for the CIO