Email Alerts
-
Encryption outside the box
When it comes to encryption, users have two basic choices: hardware appliances or software applications. Given software's performance issues only small shops need apply. Article
-
PING with Karen Worstell
The Microsoft CISO discusses how she keeps Redmond and its products secure. Information Security maga
-
Life at the edge part 3: Resistance to failure
Learn how architecture, protocol and application-level protections work together to safeguard a Web infrastructure. Security School
-
Protect files and folders from snoops
Read this tip and learn about four specific steps you can take to secure your desktop files and folders. Tip
-
Quiz: Cryptography
OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message. OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message." (Radio message to subscribed members of the Lone Ranger Clu... Quiz
-
Content Scrambling System (CSS)
Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other devices, such as computer hard drives. Definition
-
one-time pad
In cryptography, a one-time pad is a system in which a private key generated randomly is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key. Definition
-
International Data Encryption Algorithm (IDEA)
IDEA (International Data Encryption Algorithm) is an encryption algorithm developed at ETH in Zurich, Switzerland. Definition
-
What is a sufficient encryption?
Ask the Expert
-
The large file challenge
E-mail attachment caching must be included in digital asset management to enable more cost effective, secure and integrated delivery of large files. Article
Security Management Strategies for the CIO