Email Alerts
-
Should developers create libraries of common cryptographic algorithms?
In this expert response, Michael Cobb explains why developers don't need to create their own cryptolibraries. Ask the Expert
-
What is an encryption collision?
Michael Cobb reviews how encryption collision attacks on cryptographic hash functions could compromise the security of all kinds of digital systems. Ask the Expert
-
Heartland CIO on PCI, E3 project
Heartland Payment Systems CIO Steve Elefant talks about the processor's new E3 security processes, end-to-end encryption, deployment and adoption issues. News
-
Visa probes tokens, encryption for PCI card data protection
Visa issued payment industry best practices that outline the use of encryption and tokenization to protect credit card data. Article
-
Voltage, RSA spar over tokenization, data protection
Voltage cites performance issues and the creation of a repository of cardholder data an attractive target for attackers. RSA calls Voltage's claims unfounded. Article
-
How to choose full disk encryption for laptop security, compliance
Full disk encryption is becoming a priority for laptop security in midmarket companies because of regulatory compliance and fear of data breaches. Consider central management, ease of deployment, user transparency, reporting, platform support and pri... Tip
-
What are new and commonly used public-key cryptography algorithms?
Expert Michael Cobb breaks down a variety of encryption algorithms and reviews the use cases for several types of cryptography. Ask the Expert
-
What are the export limitations for AES data encryption?
Although AES is free for any use public or private, commercial or non-commercial programs that provide encryption capabilities are subject to U.S. export controls. Expert Michael Cobb reviews the limitations. Ask the Expert
-
Curveball: Endpoint encryption strategies
When a laptop turns up stolen, it's reassuring to know that the contents of the device were encrypted, transforming a potentially disastrous data breach into a simple case of missing hardware. In this podcast we look at the issues surrounding the use... Podcast
-
How to prevent network sniffing and eavesdropping
Scenario: A hacker wants to glean data from two of your servers by installing network monitoring software. How can you prevent him from getting the data he wants? Learn more in this expert response. Ask the Expert
Security Management Strategies for the CIO