Email Alerts
-
Is it possible to crack the public key encryption algorithm?
Is it possible to create a PKI encryption key that is unbreakable? IAM expert Randall Gamby weighs in. Ask the Expert
-
What are the top three network intrusion techniques?
Nick Lewis reviews the top three technologies used by hackers to cover their tracks after a network intrusion. Ask the Expert
-
How to protect a laptop: Biometrics vs. encryption
How has biometrics changed the laptop security landscape? Is full disk encryption even necessary on a laptop with a biometric scanner? Learn more in this expert response. Ask the Expert
-
How to encrypt data-at-rest to meet the HITECH act regulations
What's the best way to encrypt data-at-rest to meet the HITECH act regulations? Learn how to interpret guidance from NIST 800-111 in this security management expert response from David Mortman. Ask the Expert
-
Health Net healthcare data breach affects1.5 million
A lost hard drive contained seven years of patient data including Social Security numbers and medical records of more than a million Health Net customers. Article
-
Prevent meet-in-the-middle attacks with TDES encryption
Don't let meet-in-the-middle attacks decrypt your sensitive data. Learn how to use the triple DES encryption algorithm to prevent such attacks, with expert Randall Gamby. Ask the Expert
-
Heartland CIO is critical of First Data's credit card tokenization plan
First Data Corp. uses RSA software for tokenization, providing a possible threat vector for attackers, says Heartland CIO Steven Elefant. Article
-
Heartland CIO on end-to-end encryption, credit card tokenization
Steven Elefant, CIO of Princeton, NJ-based Heartland Payment Systems Inc., is leading development on the payment processor's E3 end-to-end encryption plan and new secure payment terminals. Elefant, who joined Heartland last year, said the payment pro... Interview
-
What is an encryption collision?
Michael Cobb reviews how encryption collision attacks on cryptographic hash functions could compromise the security of all kinds of digital systems. Ask the Expert
-
Should developers create libraries of common cryptographic algorithms?
In this expert response, Michael Cobb explains why developers don't need to create their own cryptolibraries. Ask the Expert
Security Management Strategies for the CIO