Email Alerts
-
How does DNA cryptography relate to company information security?
What is DNA cryptography, and would it be an effective method for us in enterprise information security? IAM expert Randall Gamby discusses how DNA cryptography works and how to use it. Ask the Expert
-
Utilizing a hash function algorithm to help secure data
Learn how a hash function algorithm -- specifically a one-way hash function of the Dynamic SHA-2 algorithm -- can help protect important documents using a variety of hashes to confuse malicious code. Ask the Expert
-
MD5 security: Time to migrate to SHA-1 hash algorithm?
Many organizations have been replacing the MD5 hash algorithm with the SHA-1 hash function, but can the MD5 hash algorithm still be used securely? Ask the Expert
-
Security consequences following the GSM encryption algorithm crack
The GSM encryption algorithm crack has created a serious real-world risk for enterprise organizations. Ask the Expert
-
Is messaging in symmetric encryption better than PGP email security?
Is symmetric encryption or PGP the more reliably secure way to send email? Learn more in this expert response from Randall Gamby. Ask the Expert
-
Is the 3DES encryption algorithm the best choice for S/MIME protocol?
The triple DES encryption algorithm was originally designed for the S/MIME protocol, but is it still the best choice for encryption? In this expert response, Randall Gamby describes the advantages and disadvantages to using 3DES. Ask the Expert
-
What are the differences between symmetric and asymmetric encryption algorithms?
In this expert response, Michael Cobb explains the differences between symmetric and asymmetric encryption algorithms and the pros and cons of each. Ask the Expert
-
How to decode a cipher: Identifying a cryptographic hash algorithm
While it is possible to identify a cryptographic algorithm by way of cipher bit sequences, it can be difficult, and is sometimes illegal. IAM expert Randall Gamby gives advice and a warning. Ask the Expert
-
Password encryption program: Best practices and alternatives
If you want to create password encryption code, check out these best practices from IAM expert Randall Gamby. He also offers alternatives to encrypting, such as using Kerberos or Federation SAML. Ask the Expert
-
Cloud computing risks: Secure encryption key management on virtual machines
As cloud computing grows in popularity, secure encryption key management becomes more vital. Michael Cobb explains the security risk affecting cloud computing and virtualized computing and why encryption key management policies need to be included in... Ask the Expert
Security Management Strategies for the CIO