Email Alerts
-
MD5 security: Time to migrate to SHA-1 hash algorithm?
Many organizations have been replacing the MD5 hash algorithm with the SHA-1 hash function, but can the MD5 hash algorithm still be used securely? Ask the Expert
-
Security consequences following the GSM encryption algorithm crack
The GSM encryption algorithm crack has created a serious real-world risk for enterprise organizations. Ask the Expert
-
Is messaging in symmetric encryption better than PGP email security?
Is symmetric encryption or PGP the more reliably secure way to send email? Learn more in this expert response from Randall Gamby. Ask the Expert
-
PCI compliance encryption includes hardening key management systems
As companies deploy encryption to protect cardholder data, French security giant, Thales Group is making the case for hardware security modules (HSMs) to protect the underlying key management systems at the heart of all encryption systems. According ... Interview
-
Symantec acquires PGP, GuardianEdge for encryption, key management
Symantec said it would integrate PGP's key management platform into the Symantec Protection Center and add encryption capabilities to boost its endpoint protection offerings. Article
-
Is the 3DES encryption algorithm the best choice for S/MIME protocol?
The triple DES encryption algorithm was originally designed for the S/MIME protocol, but is it still the best choice for encryption? In this expert response, Randall Gamby describes the advantages and disadvantages to using 3DES. Ask the Expert
-
How to change from WEP to WPA for PCI DSS compliance
The deadline to change from WEP to WPA wireless encryption standard for PCI DSS compliance is quickly approaching. Learn how to change from WEP to WPA and how to ensure that WEP is completely eradicated from your network. Tip
-
Portable USB thumb drive encryption: Software and security policy
If you allow USB flash drives at your enterprise, encryption software and policy are a must. In this tip, learn about the best USB encryption options and how to choose one for your organization. Tip
-
Bruce Schneier on cryptography and government information security
Author and leading security expertBruce Schneier digs into the topics of the current state of cryptography and whether or not companies should care about the U.S. government's release of portions of the CNCI. Video
-
Data encryption methods: Securing emerging endpoints
Enterprises face a new challenge in the form of endpoint encryption for emerging devices. In this tip, Mike Chapple explains how companies can go about evaluating and choosing data encryption methods for emerging endpoints such as iPads, netbooks and... Tip
Security Management Strategies for the CIO