Email Alerts
-
How to use TrueCrypt for disk encryption
Learn how to use TrueCrypt to create an ecrypted drive on a Windows PC, as well as how to create a hidden drive within a drive as an additional data protection measure. Tip
-
The future of PCI DSS encryption requirements? Tokenization for PCI
Can tokenization help reduce the scope of PCI DSS? How does tokenization interact with PCI DSS encryption requirements? Learn more about this technology and whether it's right for your enterprise. Tip
-
Is it possible to crack the public key encryption algorithm?
Is it possible to create a PKI encryption key that is unbreakable? IAM expert Randall Gamby weighs in. Ask the Expert
-
What are the top three network intrusion techniques?
Nick Lewis reviews the top three technologies used by hackers to cover their tracks after a network intrusion. Ask the Expert
-
How to protect a laptop: Biometrics vs. encryption
How has biometrics changed the laptop security landscape? Is full disk encryption even necessary on a laptop with a biometric scanner? Learn more in this expert response. Ask the Expert
-
How to encrypt data-at-rest to meet the HITECH act regulations
What's the best way to encrypt data-at-rest to meet the HITECH act regulations? Learn how to interpret guidance from NIST 800-111 in this security management expert response from David Mortman. Ask the Expert
-
Health Net healthcare data breach affects1.5 million
A lost hard drive contained seven years of patient data including Social Security numbers and medical records of more than a million Health Net customers. Article
-
Prevent meet-in-the-middle attacks with TDES encryption
Don't let meet-in-the-middle attacks decrypt your sensitive data. Learn how to use the triple DES encryption algorithm to prevent such attacks, with expert Randall Gamby. Ask the Expert
-
Heartland CIO on end-to-end encryption, credit card tokenization
Steven Elefant, CIO of Princeton, NJ-based Heartland Payment Systems Inc., is leading development on the payment processor's E3 end-to-end encryption plan and new secure payment terminals. Elefant, who joined Heartland last year, said the payment pro... Interview
-
Heartland CIO is critical of First Data's credit card tokenization plan
First Data Corp. uses RSA software for tokenization, providing a possible threat vector for attackers, says Heartland CIO Steven Elefant. Article
Security Management Strategies for the CIO