Email Alerts
-
Is messaging in symmetric encryption better than PGP email security?
Is symmetric encryption or PGP the more reliably secure way to send email? Learn more in this expert response from Randall Gamby. Ask the Expert
-
PCI compliance encryption includes hardening key management systems
As companies deploy encryption to protect cardholder data, French security giant, Thales Group is making the case for hardware security modules (HSMs) to protect the underlying key management systems at the heart of all encryption systems. According ... Interview
-
Symantec acquires PGP, GuardianEdge for encryption, key management
Symantec said it would integrate PGP's key management platform into the Symantec Protection Center and add encryption capabilities to boost its endpoint protection offerings. Article
-
Is the 3DES encryption algorithm the best choice for S/MIME protocol?
The triple DES encryption algorithm was originally designed for the S/MIME protocol, but is it still the best choice for encryption? In this expert response, Randall Gamby describes the advantages and disadvantages to using 3DES. Ask the Expert
-
How to change from WEP to WPA for PCI DSS compliance
The deadline to change from WEP to WPA wireless encryption standard for PCI DSS compliance is quickly approaching. Learn how to change from WEP to WPA and how to ensure that WEP is completely eradicated from your network. Tip
-
Portable USB thumb drive encryption: Software and security policy
If you allow USB flash drives at your enterprise, encryption software and policy are a must. In this tip, learn about the best USB encryption options and how to choose one for your organization. Tip
-
Bruce Schneier on cryptography and government information security
Author and leading security expertBruce Schneier digs into the topics of the current state of cryptography and whether or not companies should care about the U.S. government's release of portions of the CNCI. Video
-
Data encryption methods: Securing emerging endpoints
Enterprises face a new challenge in the form of endpoint encryption for emerging devices. In this tip, Mike Chapple explains how companies can go about evaluating and choosing data encryption methods for emerging endpoints such as iPads, netbooks and... Tip
-
What are the differences between symmetric and asymmetric encryption algorithms?
In this expert response, Michael Cobb explains the differences between symmetric and asymmetric encryption algorithms and the pros and cons of each. Ask the Expert
-
Pwn2Own hacker contest - DOE CISO on encryption
A brief look at the Pwn2Own hacker contest at the CanSecWest conference in Vancouver, BC. Also Department of Education CISO Phil Loranger on encryption. News
Security Management Strategies for the CIO