Email Alerts
-
What are the export limitations for AES data encryption?
Although AES is free for any use public or private, commercial or non-commercial programs that provide encryption capabilities are subject to U.S. export controls. Expert Michael Cobb reviews the limitations. Ask the Expert
-
How to prevent network sniffing and eavesdropping
Scenario: A hacker wants to glean data from two of your servers by installing network monitoring software. How can you prevent him from getting the data he wants? Learn more in this expert response. Ask the Expert
-
Steganography techniques: MD5 implementation or RC4 encryption?
Although it is difficult to decipher encrypted data, steganography itself is relatively easy to detect. Expert Michael Cobb reviews which encryption algorithm is best to use when hiding important data. Ask the Expert
-
How to prevent operating system cloning with AES 256-bit encryption
Reading a binary image file and cloning a system can lead to serious data loss. Learn how to prevent this from happening with this advice from network security expert Mike Chapple. Ask the Expert
-
HHS HIPAA guidance on encryption requirements and data destruction
Complying with HIPAA is only becoming more challenging. Fortunately, the Department of Health and Human Services has recently released some preliminary guidelines on how to deal with HIPAA's encryption requirements and data destruction. Ask the Expert
-
The difference between AES encryption and DES encryption
Choosing whether to encrypt your network data with the AES encryption algorithm or the DES encryption algorithm, is an important security matter. Learn which is the more secure option in this expert response. Ask the Expert
-
A simple substitution cipher vs. one-time pad software
Both a simple subsitution cipher and one-time pad software have data encryption benefits despite their differences. Ask the Expert
-
Are encrypted, self-deleting USB storage drives worth the investment?
Expert Michael Cobb explains why some high-end, encrypted, self-deleting USB drives are worth looking into and may be a good investment. Ask the Expert
-
Should open source disk-encryption software be used?
When it comes to IT security, Michael Cobb recommends encryption devices or software that provide the most effective product for the threat being mitigated. Sound simple? See if that advice includes open-source tools. Ask the Expert
-
Cryptosystem attacks that do not involve obtaining the decryption key
When a cryptosystem is attacked, are there more things to look out for than attacks that involve getting the decryption key? Find out more in this IAM expert response. Ask the Expert
Security Management Strategies for the CIO