Email Alerts
-
Realign your data protection strategy efforts
In this video, learn what you need to do to realign your strategic focus to counter new threats by first understanding what’s important to your business. Video
-
PCI encryption: PCI Council calls point-to-point encryption immature
The PCI Council's latest guidance document for point-to-point encryption calls the market for the technology too immature and warns merchants that vendor lock-in could be a problem. Article
-
Unmasking data masking techniques in the enterprise
Patch-testing and development environments can't use live data and keep it secure. That's where data masking comes in. Michael Cobb examines the principles behind data masking and why security pros should endorse its use in order to keep production d... Tip
-
How does DNA cryptography relate to company information security?
What is DNA cryptography, and would it be an effective method for us in enterprise information security? IAM expert Randall Gamby discusses how DNA cryptography works and how to use it. Ask the Expert
-
Utilizing a hash function algorithm to help secure data
Learn how a hash function algorithm -- specifically a one-way hash function of the Dynamic SHA-2 algorithm -- can help protect important documents using a variety of hashes to confuse malicious code. Ask the Expert
-
Tokens vs encryption: RSA touts tokens
Encryption expert Robert Griffin, technical director at RSA, the security division of EMC Corp., explains why RSA is pushing card-based tokens over format preserving encryption in the payment process. News
-
Tokenization vs encryption: RSA touts tokens to reduce PCI DSS pain
Payment industry executives and security experts are currently debating over the right way to preserve and protect credit card data. Merchants can choose between a variety of formats, from format preserving encryption, which replaces the 16-digit cre... Interview
-
NuBridges update enables simultaneous data center tokenization
The software update helps enterprises coordinate the issuing of tokens among multiple data centers, and apply the technology to PII and PHI. Article
-
Choosing smartphone encryption software for mobile smartphone security
If your enterprise users have smartphones, then your enterprise may need smartphone encryption. In this tip, expert Dave Shackleford describes what to look for in smartphone encryption software, from cost to management capabilities. Tip
-
Finding affordable encryption options for laptop data security
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and ... E-Zine
Security Management Strategies for the CIO