Email Alerts
-
What are the differences between symmetric and asymmetric encryption algorithms?
In this expert response, Michael Cobb explains the differences between symmetric and asymmetric encryption algorithms and the pros and cons of each. Ask the Expert
-
Pwn2Own hacker contest - DOE CISO on encryption
A brief look at the Pwn2Own hacker contest at the CanSecWest conference in Vancouver, BC. Also Department of Education CISO Phil Loranger on encryption. News
-
How to decode a cipher: Identifying a cryptographic hash algorithm
While it is possible to identify a cryptographic algorithm by way of cipher bit sequences, it can be difficult, and is sometimes illegal. IAM expert Randall Gamby gives advice and a warning. Ask the Expert
-
Password encryption program: Best practices and alternatives
If you want to create password encryption code, check out these best practices from IAM expert Randall Gamby. He also offers alternatives to encrypting, such as using Kerberos or Federation SAML. Ask the Expert
-
Cloud computing risks: Secure encryption key management on virtual machines
As cloud computing grows in popularity, secure encryption key management becomes more vital. Michael Cobb explains the security risk affecting cloud computing and virtualized computing and why encryption key management policies need to be included in... Ask the Expert
-
Advanced Encryption Standard and AES ciphers: Can they be cracked?
No encryption standard is unbreakable, but Advanced Encryption Standard may come close. Michael Cobb discusses why AES ciphers are so tough to beat. Ask the Expert
-
At RSA Conference, experts dismiss end-to-end encryption claims
Payment industry "buzz" term isn't really reality, say some industry experts at RSA Conference 2010. Article
-
NSA, cryptoexperts jab at RSA Conference 2010 Cryptographers' Panel
A good-natured spat between cryptography pioneers and a former NSA technical director spices up the annual Cryptographers' Panel at RSA Conference 2010. Article
-
How to prevent iPhone spying: Mobile phone management tips
So you have an iPhone, you don't access the Internet, you use a PIN to authenticate and you never let the device out of your site. Michael Cobb explains why iPhone spying still isn't out of the question. Tip
-
No major PCI DSS revision expected in 2010
The next revision of PCI DSS will contain clarifications, but no major revisions, according to Bob Russo, general manager of the PCI Security Standards Council. Article
Security Management Strategies for the CIO